<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0117-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-01-15T09:07:49Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-01-15T09:07:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-01-15T09:07:49Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).
- CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
- CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).
- CVE-2024-44996: vsock: fix recursive -&gt;recvmsg calls (bsc#1230205).
- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
- CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).
- CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
- CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).
- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).
- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).
- CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467).
- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
- CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546).
- CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558).
- CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).
- CVE-2024-53099: bpf: Check validity of link-&gt;type in bpf_link_show_fdinfo() (bsc#1233772).
- CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069).
- CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086).
- CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077).
- CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079).
- CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071).
- CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).
- CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219).
- CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220).
- CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221)
- CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810).
- CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003).
- CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974).
- CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (bsc#1234282).
- CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object-&gt;file (bsc#1234912).
- CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033).
- CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128).
- CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).

The following non-security bugs were fixed:

- 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes).
- accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes).
- accel/habanalabs: fix debugfs files permissions (stable-fixes).
- accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable-fixes).
- accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes).
- acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes).
- ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467).
- ACPI: resource: Fix memory resource type union access (git-fixes).
- ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable-fixes).
- ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable-fixes).
- ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable-fixes).
- ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)
- ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes).
- af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725).
- afs: Automatically generate trace tag enums (git-fixes).
- afs: Fix missing subdir edit when renamed between parent dirs (git-fixes).
- ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes).
- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
- ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes).
- ALSA: line6: Fix racy access to midibuf (stable-fixes).
- ALSA: seq: Check UMP support for midi_version change (git-fixes).
- ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes).
- ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes).
- ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes).
- ALSA: seq: ump: Use guard() for locking (stable-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes).
- ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes).
- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
- ALSA: usb-audio: US16x08: Initialize array before use (git-fixes).
- amdgpu/uvd: get ring reference from rq scheduler (git-fixes).
- arch: consolidate arch_irq_work_raise prototypes (git-fixes).
- arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773).
- arch: Remove cmpxchg_double (bsc#1220773).
- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
- arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605)
- arm64: Force position-independent veneers (git-fixes).
- ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes).
- ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes).
- ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes).
- ASoC: amd: yc: Fix the wrong return value (git-fixes).
- ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
- ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
- ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
- ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).
- ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
- ASoC: hdmi-codec: reorder channel allocation list (stable-fixes).
- ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes).
- ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable-fixes).
- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
- ASoC: nau8822: Lower debug print priority (stable-fixes).
- ASoC: SOF: Remove libraries from topology lookups (git-fixes).
- autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).
- batman-adv: Do not let TT changes list grows indefinitely (git-fixes).
- batman-adv: Do not send uninitialized TT changes (git-fixes).
- batman-adv: Remove uninitialized data in full table TT response (git-fixes).
- blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726).
- blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139).
- blk-iocost: do not WARN if iocg was already offlined (bsc#1234147).
- blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144).
- blk-throttle: fix lockdep warning of 'cgroup_mutex or RCU read lock required!' (bsc#1234140).
- block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149).
- block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150).
- block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160).
- block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280).
- block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279).
- block: Call .limit_depth() after .hctx has been set (bsc#1234148).
- block: Fix where bio IO priority gets set (bsc#1234145).
- block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142).
- block: update the stable_writes flag in bdev_add (bsc#1234141).
- block/mq-deadline: Fix the tag reservation code (bsc#1234148).
- Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable-fixes).
- Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable-fixes).
- Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes).
- Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git-fixes).
- Bluetooth: iso: Fix recursive locking warning (git-fixes).
- Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes).
- Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes).
- Bluetooth: MGMT: Fix possible deadlocks (git-fixes).
- Bluetooth: SCO: Add support for 16 bits transparent voice setting (git-fixes).
- bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes).
- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
- bnxt_en: Set backplane link modes correctly for ethtool (git-fixes).
- bpf, x86: Fix PROBE_MEM runtime load check (git-fixes).
- bpf: verifier: prevent userspace memory access (git-fixes).
- btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)
- can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes).
- can: j1939: fix error in J1939 documentation (stable-fixes).
- checkpatch: always parse orig_commit in fixes tag (git-fixes).
- checkpatch: check for missing Fixes tags (stable-fixes).
- clocksource/drivers:sp804: Make user selectable (git-fixes).
- clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git-fixes).
- counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes).
- counter: ti-ecap-capture: Add check for clk_enable() (git-fixes).
- crypto: qat - disable IOV in adf_dev_stop() (git-fixes).
- crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes).
- cyrpto/b128ops: Remove struct u128 (bsc#1220773).
- devlink: Fix length of eswitch inline-mode (git-fixes).
- dma-buf: fix dma_fence_array_signaled v4 (stable-fixes).
- dma-debug: fix a possible deadlock on radix_lock (stable-fixes).
- dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes).
- dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git-fixes).
- dmaengine: dw: Select only supported masters for ACPI devices (git-fixes).
- dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357).
- dmaengine: mv_xor: fix child node refcount handling in early exit (git-fixes).
- dmaengine: tegra: Return correct DMA status when paused (git-fixes).
- Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git-fixes).
- driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes).
- driver core: fw_devlink: Improve logs for cycle detection (stable-fixes).
- driver core: fw_devlink: Stop trying to optimize cycle detection logic (git-fixes).
- Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-fixes).
- drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes).
- drm: adv7511: Drop dsi single lane support (git-fixes).
- drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes).
- drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes).
- drm/amd/display: Add HDR workaround for specific eDP (stable-fixes).
- drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes).
- drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
- drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes).
- drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).
- drm/amd/display: Revert Avoid overflow assignment (stable-fixes).
- drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable-fixes).
- drm/amd/pm: fix the high voltage issue after unload (stable-fixes).
- drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes).
- drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
- drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes).
- drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes).
- drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes).
- drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes).
- drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes).
- drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).
- drm/amdgpu: do not access invalid sched (git-fixes).
- drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
- drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).
- drm/amdgpu: fix usage slab after free (stable-fixes).
- drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
- drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable-fixes).
- drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes).
- drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes).
- drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes).
- drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes).
- drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes).
- drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes).
- drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes).
- drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes).
- drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes).
- drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes).
- drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes).
- drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
- drm/amdkfd: pause autosuspend when creating pdd (stable-fixes).
- drm/amdkfd: Use device based logging for errors (stable-fixes).
- drm/amdkfd: Use the correct wptr size (stable-fixes).
- drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes).
- drm/bridge: it6505: Enable module autoloading (stable-fixes).
- drm/bridge: it6505: Fix inverted reset polarity (git-fixes).
- drm/bridge: it6505: update usleep_range for RC circuit charge time (stable-fixes).
- drm/display: Fix building with GCC 15 (stable-fixes).
- drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes).
- drm/dp_mst: Fix MST sideband message body length check (stable-fixes).
- drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes).
- drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes).
- drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes).
- drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes).
- drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes).
- drm/i915/dg1: Fix power gate sequence (git-fixes).
- drm/mcde: Enable module autoloading (stable-fixes).
- drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable-fixes).
- drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes).
- drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git-fixes).
- drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes).
- drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
- drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes).
- drm/radeon: change rdev-&gt;ddev to rdev_to_drm(rdev) (stable-fixes).
- drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes).
- drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).
- drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes).
- drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes).
- drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes).
- drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes).
- erofs: avoid debugging output for (de)compressed data (git-fixes).
- exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).
- ext4: add a new helper to check if es must be kept (bsc#1234170).
- ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164).
- ext4: add missed brelse in update_backups (bsc#1234171).
- ext4: allow for the last group to be marked as trimmed (bsc#1234278).
- ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191).
- ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180).
- ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193).
- ext4: avoid overlapping preallocations due to overflow (bsc#1234162).
- ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192).
- ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187).
- ext4: check the extent status again before inserting delalloc block (bsc#1234186).
- ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190).
- ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178).
- ext4: correct best extent lstart adjustment logic (bsc#1234179).
- ext4: correct grp validation in ext4_mb_good_group (bsc#1234163).
- ext4: correct return value of ext4_convert_meta_bg (bsc#1234172).
- ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178).
- ext4: correct the start block of counting reserved clusters (bsc#1234169).
- ext4: do not let fstrim block system suspend (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166).
- ext4: do not trim the group with corrupted block bitmap (bsc#1234177).
- ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170).
- ext4: factor out a common helper to query extent map (bsc#1234186).
- ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176).
- ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188).
- ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188).
- ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188).
- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
- ext4: fix potential unnitialized variable (bsc#1234183).
- ext4: fix race between writepages and remount (bsc#1234168).
- ext4: fix rec_len verify error (bsc#1234167).
- ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170).
- ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185).
- ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178).
- ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170).
- ext4: make ext4_es_insert_extent() return void (bsc#1234170).
- ext4: make ext4_es_remove_extent() return void (bsc#1234170).
- ext4: make ext4_zeroout_es() return void (bsc#1234170).
- ext4: make sure allocate pending entry not fail (bsc#1234170).
- ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175).
- ext4: move 'ix' sanity check to corrent position (bsc#1234174).
- ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165).
- ext4: nested locking for xattr inode (bsc#1234189).
- ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194).
- ext4: refactor ext4_da_map_blocks() (bsc#1234178).
- ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173).
- ext4: remove the redundant folio_wait_stable() (bsc#1234184).
- ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182).
- ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181).
- ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170).
- ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170).
- ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170).
- ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170).
- ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170).
- filemap: add a per-mapping stable writes flag (bsc#1234141).
- filemap: Fix bounds checking in filemap_read() (bsc#1234209).
- firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes).
- fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200).
- fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207).
- fsnotify: fix sending inotify event with unexpected filename (bsc#1234198).
- genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git-fixes).
- genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git-fixes).
- genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes).
- gpio: grgpio: Add NULL check in grgpio_probe (git-fixes).
- gpio: grgpio: use a helper variable to store the address of ofdev-&gt;dev (stable-fixes).
- hfsplus: do not query the device logical block size multiple times (git-fixes).
- HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes).
- hvc/xen: fix console unplug (git-fixes).
- hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes).
- hvc/xen: fix event channel handling for secondary consoles (git-fixes).
- hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable-fixes).
- hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes).
- hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes).
- hwmon: (tmp513) Do not use 'proxy' headers (stable-fixes).
- hwmon: (tmp513) Fix Current Register value interpretation (git-fixes).
- hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes).
- hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes).
- hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes).
- hwmon: (tmp513) Use SI constants from units.h (stable-fixes).
- i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git-fixes).
- i2c: microchip-core: actually use repeated sends (git-fixes).
- i2c: microchip-core: fix 'ghost' detections (git-fixes).
- i2c: pnx: Fix timeout in wait functions (git-fixes).
- i2c: riic: Always round-up when calculating bus period (git-fixes).
- i40e: Fix handling changed priv flags (git-fixes).
- i915/guc: Accumulate active runtime on gt reset (git-fixes).
- i915/guc: Ensure busyness counter increases motonically (git-fixes).
- i915/guc: Reset engine utilization buffer before registration (git-fixes).
- ice: change q_index variable type to s16 to store -1 value (git-fixes).
- ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes).
- ice: fix PHY Clock Recovery availability check (git-fixes).
- ice: Unbind the workqueue (bsc#1234989)
- idpf: add support for SW triggered interrupts (bsc#1235507).
- idpf: enable WB_ON_ITR (bsc#1235507).
- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
- igb: Fix potential invalid memory access in igb_init_module() (git-fixes).
- iio: magnetometer: yas530: use signed integer type for clamp limits (git-fixes).
- instrumentation: Wire up cmpxchg128() (bsc#1220773).
- io_uring: always lock __io_cqring_overflow_flush (git-fixes).
- io_uring: check if iowq is killed before queuing (git-fixes).
- io_uring: Fix registered ring file refcount leak (git-fixes).
- io_uring/rw: avoid punting to io-wq directly (git-fixes).
- io_uring/tctx: work around xa_store() allocation error issue (git-fixes).
- iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git-fixes).
- irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes).
- isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199).
- ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes).
- ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes).
- jffs2: Fix rtime decompressor (git-fixes).
- jffs2: fix use of uninitialized variable (git-fixes).
- jffs2: Prevent rtime decompress memory corruption (git-fixes).
- jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-fixes).
- jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).
- jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).
- jfs: fix shift-out-of-bounds in dbSplit (git-fixes).
- jfs: xattr: check invalid xattr size more strictly (git-fixes).
- kasan: make report_lock a raw spinlock (git-fixes).
- kdb: address -Wformat-security warnings (bsc#1234659).
- kdb: Fix buffer overflow during tab-complete (bsc#1234652).
- kdb: Fix console handling when editing and tab-completing commands (bsc#1234655).
- kdb: Merge identical case statements in kdb_read() (bsc#1234657).
- kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658).
- kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654).
- kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654).
- kgdb: Flush console before entering kgdb on panic (bsc#1234651).
- leds: class: Protect brightness_show() with led_cdev-&gt;led_access mutex (stable-fixes).
- linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes).
- locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix).
- loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143).
- mac80211: fix user-power when emulating chanctx (stable-fixes).
- media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable-fixes).
- media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git-fixes).
- media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes).
- media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes).
- mfd: da9052-spi: Change read-mask to write-mask (git-fixes).
- mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes).
- mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes).
- mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes).
- mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204).
- mm/readahead: do not allow order-1 folio (bsc#1234205).
- mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208).
- mmc: core: Add SD card quirk for broken poweroff notification (stable-fixes).
- mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes).
- mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes).
- mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes).
- mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes).
- mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git-fixes).
- mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes).
- mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
- mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes).
- mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes).
- mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes).
- mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes).
- net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes).
- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
- net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes).
- net: usb: qmi_wwan: add Quectel RG650V (stable-fixes).
- net/ipv6: release expired exception dst cached in socket (bsc#1216813).
- net/mlx5e: clear xdp features on non-uplink representors (git-fixes).
- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
- net/mlx5e: Remove workaround to avoid syndrome for internal port (git-fixes).
- net/qed: allow old cards not supporting 'num_images' to work (git-fixes).
- nfs: ignore SB_RDONLY when mounting nfs (git-fixes).
- NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-fixes).
- NFSD: Async COPY result needs to return a write verifier (git-fixes).
- NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git-fixes).
- nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes).
- NFSD: Fix nfsd4_shutdown_copy() (git-fixes).
- NFSD: initialize copy-&gt;cp_clp early in nfsd4_copy for use by trace point (git-fixes).
- nfsd: make sure exp active before svc_export_show (git-fixes).
- NFSD: Prevent a potential integer overflow (git-fixes).
- NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).
- nfsd: release svc_expkey/svc_export with rcu_work (git-fixes).
- NFSD: Remove a never-true comparison (git-fixes).
- nfsd: restore callback functionality for NFSv4.0 (git-fixes).
- NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-fixes).
- nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git-fixes).
- nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes).
- nilfs2: prevent use of deleted inode (git-fixes).
- nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes).
- nvme-rdma: unquiesce admin_q before destroy it (git-fixes).
- nvme-tcp: fix the memleak while create new ctrl failed (git-fixes).
- nvme: apple: fix device reference counting (git-fixes).
- nvme: fix metadata handling in nvme-passthrough (git-fixes).
- nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes).
- nvmet-loop: avoid using mutex in IO hotpath (git-fixes).
- ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes).
- ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes).
- Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes).
- of: address: Report error on resource bounds overflow (stable-fixes).
- of: Fix error path in of_parse_phandle_with_args_map() (git-fixes).
- of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git-fixes).
- of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes).
- parisc: Raise minimal GCC version (bsc#1220773).
- parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix).
- PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes).
- PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes).
- PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes).
- PCI: Add T_PERST_CLK_US macro (git-fixes).
- PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes).
- PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes).
- PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes).
- PCI: Detect and trust built-in Thunderbolt chips (stable-fixes).
- PCI: Fix use-after-free of slot-&gt;bus on hot remove (stable-fixes).
- PCI: j721e: Add PCIe 4x lane selection support (stable-fixes).
- PCI: j721e: Add per platform maximum lane settings (stable-fixes).
- PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes).
- PCI: j721e: Add suspend and resume support (git-fixes).
- PCI: j721e: Use T_PERST_CLK_US macro (git-fixes).
- PCI: qcom: Add support for IPQ9574 (stable-fixes).
- PCI: Use preserve_config in place of pci_flags (stable-fixes).
- PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable-fixes).
- PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes).
- PCI/AER: Disable AER service on suspend (stable-fixes).
- PCI/MSI: Handle lack of irqdomain gracefully (git-fixes).
- percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773).
- percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix).
- percpu: Wire up cmpxchg128 (bsc#1220773).
- phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes).
- phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git-fixes).
- phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes).
- phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git-fixes).
- phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes).
- phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes).
- phy: rockchip: naneng-combphy: fix phy reset (git-fixes).
- phy: usb: Toggle the PHY power during init (git-fixes).
- pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes).
- pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes).
- pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes).
- pinmux: Use sequential access to access desc-&gt;pinmux data (stable-fixes).
- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
- platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes).
- platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes).
- platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable-fixes).
- platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes).
- power: supply: gpio-charger: Fix set charge current limits (git-fixes).
- powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108).
- proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-fixes).
- quota: explicitly forbid quota files from being encrypted (bsc#1234196).
- quota: Fix rcu annotations of inode dquot pointers (bsc#1234197).
- quota: flush quota_release_work upon quota writeback (bsc#1234195).
- quota: simplify drop_dquot_ref() (bsc#1234197).
- RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467).
- RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes)
- RDMA/bnxt_re: Avoid initializing the software queue for user queues (git-fixes)
- RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes)
- RDMA/bnxt_re: Disable use of reserved wqes (git-fixes)
- RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes)
- RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes)
- RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes)
- RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes)
- RDMA/bnxt_re: Remove always true dattr validity check (git-fixes)
- RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
- RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes)
- RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes)
- RDMA/hns: Fix missing flush CQE for DWQE (git-fixes)
- RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes)
- RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes)
- RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes)
- RDMA/uverbs: Prevent integer overflow issue (git-fixes)
- readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208).
- regmap: Use correct format specifier for logging range errors (stable-fixes).
- regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes).
- rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes).
- s390/cio: Do not unregister the subchannel based on DNV (git-fixes).
- s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773).
- s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes).
- s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes).
- s390/facility: Disable compile time optimization for decompressor code (git-fixes).
- s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes).
- s390/pageattr: Implement missing kernel_page_present() (git-fixes).
- scatterlist: fix incorrect func name in kernel-doc (git-fixes).
- sched/numa: fix memory leak due to the overwritten vma-&gt;numab_state (git fixes (sched/numa)).
- scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409).
- scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409).
- scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409).
- scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409).
- scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409).
- scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409).
- scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409).
- scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409).
- scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409).
- scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409).
- scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406).
- scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406).
- scsi: qla2xxx: Fix use after free on unload (bsc#1235406).
- scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406).
- scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406).
- scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406).
- scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406).
- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).
- selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes).
- serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes).
- serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git-fixes).
- serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes).
- serial: 8250_fintek: Add support for F81216E (stable-fixes).
- serial: amba-pl011: fix build regression (git-fixes).
- serial: amba-pl011: Fix RX stall when DMA is used (git-fixes).
- serial: amba-pl011: Use port lock wrappers (stable-fixes).
- serial: Do not hold the port lock when setting rx-during-tx GPIO (git-fixes).
- serial: do not use uninitialized value in uart_poll_init() (git-fixes).
- serial: imx: only set receiver level if it is zero (git-fixes).
- serial: imx: set receiver level before starting uart (git-fixes).
- serial: qcom-geni: disable interrupts during console writes (git-fixes).
- serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git-fixes).
- serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git-fixes).
- serial: qcom-geni: fix console corruption (git-fixes).
- serial: qcom-geni: fix dma rx cancellation (git-fixes).
- serial: qcom-geni: fix false console tx restart (git-fixes).
- serial: qcom-geni: fix fifo polling timeout (git-fixes).
- serial: qcom-geni: fix hard lockup on buffer flush (git-fixes).
- serial: qcom-geni: fix polled console corruption (git-fixes).
- serial: qcom-geni: fix polled console initialisation (git-fixes).
- serial: qcom-geni: fix receiver enable (git-fixes).
- serial: qcom-geni: fix shutdown race (git-fixes).
- serial: qcom-geni: fix soft lockup on sw flow control and suspend (git-fixes).
- serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes).
- serial: qcom-geni: revert broken hibernation support (git-fixes).
- serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes).
- serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git-fixes).
- slub: Replace cmpxchg_double() - KABI fix (bsc#1220773).
- slub: Replace cmpxchg_double() (bsc#1220773).
- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642]
- soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes).
- soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes).
- soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes).
- soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes).
- soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes).
- soc: imx8m: Probe the SoC driver as platform driver (stable-fixes).
- soc: qcom: Add check devm_kasprintf() returned value (stable-fixes).
- soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git-fixes).
- soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes).
- soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes).
- soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes).
- spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes).
- sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes).
- sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes).
- sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes).
- SUNRPC: make sure cache entry active before cache_show (git-fixes).
- SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes).
- svcrdma: Address an integer overflow (git-fixes).
- svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-fixes).
- swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes).
- swiotlb: Reinstate page-alignment for mappings &gt;= PAGE_SIZE (git-fixes).
- thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes).
- tools: hv: change permissions of NetworkManager configuration file (git-fixes).
- tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)
- tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421).
- tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes).
- types: Introduce [us]128 (bsc#1220773).
- ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-fixes).
- ubifs: Correct the total block count by deducting journal reservation (git-fixes).
- udf: Fix lock ordering in udf_evict_inode() (bsc#1234238).
- udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243).
- udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239).
- udf: refactor inode_bmap() to handle error (bsc#1234242).
- udf: refactor udf_current_aext() to handle error (bsc#1234240).
- udf: refactor udf_next_aext() to handle error (bsc#1234241).
- udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237).
- usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes).
- usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes).
- usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes).
- usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable-fixes).
- usb: dwc2: Fix HCD port connection race (git-fixes).
- usb: dwc2: Fix HCD resume (git-fixes).
- usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes).
- usb: dwc2: hcd: Fix GetPortStatus &amp; SetPortFeature (git-fixes).
- usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes).
- usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes).
- usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git-fixes).
- usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes).
- usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes).
- usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes).
- usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes).
- usb: host: max3421-hcd: Correctly abort a USB request (git-fixes).
- USB: serial: option: add MediaTek T7XX compositions (stable-fixes).
- USB: serial: option: add MeiG Smart SLM770A (stable-fixes).
- USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable-fixes).
- USB: serial: option: add TCL IK512 MBIM &amp; ECM (stable-fixes).
- USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes).
- usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes).
- usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes).
- usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes).
- vdpa: solidrun: Fix UB bug with devres (git-fixes).
- vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes).
- vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes).
- vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes).
- vfs: fix readahead(2) on block devices (bsc#1234201).
- wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes).
- wifi: ath5k: add PCI ID for SX76X (git-fixes).
- wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes).
- wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes).
- wifi: cw1200: Fix potential NULL dereference (git-fixes).
- wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes).
- wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes).
- wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable-fixes).
- wifi: mac80211: fix station NSS capability initialization order (git-fixes).
- wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes).
- wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes).
- wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes).
- wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable-fixes).
- workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416).
- writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203).
- x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773).
- x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773).
- x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes).
- xfs: do not allocate COW extents when unsharing a hole (git-fixes).
- xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes).
- xfs: remove unknown compat feature check in superblock write validation (git-fixes).
- xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes).
- xfs: sb_spino_align is not verified (git-fixes).
- xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes).
- xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes).
- xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES15-SP6-Azure-Basic-2025-117,Image SLES15-SP6-Azure-Standard-2025-117,Image SLES15-SP6-HPC-2025-117,Image SLES15-SP6-HPC-Azure-2025-117,SUSE-2025-117,SUSE-SLE-Module-Public-Cloud-15-SP6-2025-117,openSUSE-SLE-15.6-2025-117</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      <Description>Link for SUSE-SU-2025:0117-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0117-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214954</URL>
      <Description>SUSE Bug 1214954</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216813</URL>
      <Description>SUSE Bug 1216813</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220773</URL>
      <Description>SUSE Bug 1220773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224095</URL>
      <Description>SUSE Bug 1224095</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224726</URL>
      <Description>SUSE Bug 1224726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225743</URL>
      <Description>SUSE Bug 1225743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225758</URL>
      <Description>SUSE Bug 1225758</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225820</URL>
      <Description>SUSE Bug 1225820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227445</URL>
      <Description>SUSE Bug 1227445</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228526</URL>
      <Description>SUSE Bug 1228526</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229809</URL>
      <Description>SUSE Bug 1229809</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230205</URL>
      <Description>SUSE Bug 1230205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230413</URL>
      <Description>SUSE Bug 1230413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230697</URL>
      <Description>SUSE Bug 1230697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231854</URL>
      <Description>SUSE Bug 1231854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231909</URL>
      <Description>SUSE Bug 1231909</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231963</URL>
      <Description>SUSE Bug 1231963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232193</URL>
      <Description>SUSE Bug 1232193</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232198</URL>
      <Description>SUSE Bug 1232198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232201</URL>
      <Description>SUSE Bug 1232201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232418</URL>
      <Description>SUSE Bug 1232418</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232419</URL>
      <Description>SUSE Bug 1232419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232420</URL>
      <Description>SUSE Bug 1232420</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232421</URL>
      <Description>SUSE Bug 1232421</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232436</URL>
      <Description>SUSE Bug 1232436</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233038</URL>
      <Description>SUSE Bug 1233038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233070</URL>
      <Description>SUSE Bug 1233070</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233096</URL>
      <Description>SUSE Bug 1233096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233200</URL>
      <Description>SUSE Bug 1233200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233204</URL>
      <Description>SUSE Bug 1233204</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233239</URL>
      <Description>SUSE Bug 1233239</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233259</URL>
      <Description>SUSE Bug 1233259</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233260</URL>
      <Description>SUSE Bug 1233260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233324</URL>
      <Description>SUSE Bug 1233324</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233328</URL>
      <Description>SUSE Bug 1233328</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233461</URL>
      <Description>SUSE Bug 1233461</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233467</URL>
      <Description>SUSE Bug 1233467</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233468</URL>
      <Description>SUSE Bug 1233468</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233469</URL>
      <Description>SUSE Bug 1233469</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233546</URL>
      <Description>SUSE Bug 1233546</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233558</URL>
      <Description>SUSE Bug 1233558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233637</URL>
      <Description>SUSE Bug 1233637</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233642</URL>
      <Description>SUSE Bug 1233642</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233772</URL>
      <Description>SUSE Bug 1233772</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233837</URL>
      <Description>SUSE Bug 1233837</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234024</URL>
      <Description>SUSE Bug 1234024</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234069</URL>
      <Description>SUSE Bug 1234069</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234071</URL>
      <Description>SUSE Bug 1234071</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234073</URL>
      <Description>SUSE Bug 1234073</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234075</URL>
      <Description>SUSE Bug 1234075</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234076</URL>
      <Description>SUSE Bug 1234076</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234077</URL>
      <Description>SUSE Bug 1234077</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234079</URL>
      <Description>SUSE Bug 1234079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234086</URL>
      <Description>SUSE Bug 1234086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234139</URL>
      <Description>SUSE Bug 1234139</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234140</URL>
      <Description>SUSE Bug 1234140</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234141</URL>
      <Description>SUSE Bug 1234141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234142</URL>
      <Description>SUSE Bug 1234142</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234143</URL>
      <Description>SUSE Bug 1234143</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234144</URL>
      <Description>SUSE Bug 1234144</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234145</URL>
      <Description>SUSE Bug 1234145</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234146</URL>
      <Description>SUSE Bug 1234146</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234147</URL>
      <Description>SUSE Bug 1234147</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234148</URL>
      <Description>SUSE Bug 1234148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234149</URL>
      <Description>SUSE Bug 1234149</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234150</URL>
      <Description>SUSE Bug 1234150</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234153</URL>
      <Description>SUSE Bug 1234153</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234155</URL>
      <Description>SUSE Bug 1234155</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234156</URL>
      <Description>SUSE Bug 1234156</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234158</URL>
      <Description>SUSE Bug 1234158</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234159</URL>
      <Description>SUSE Bug 1234159</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234160</URL>
      <Description>SUSE Bug 1234160</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234161</URL>
      <Description>SUSE Bug 1234161</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234162</URL>
      <Description>SUSE Bug 1234162</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234163</URL>
      <Description>SUSE Bug 1234163</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234164</URL>
      <Description>SUSE Bug 1234164</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234165</URL>
      <Description>SUSE Bug 1234165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234166</URL>
      <Description>SUSE Bug 1234166</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234167</URL>
      <Description>SUSE Bug 1234167</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234168</URL>
      <Description>SUSE Bug 1234168</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234169</URL>
      <Description>SUSE Bug 1234169</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234170</URL>
      <Description>SUSE Bug 1234170</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234171</URL>
      <Description>SUSE Bug 1234171</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234172</URL>
      <Description>SUSE Bug 1234172</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234173</URL>
      <Description>SUSE Bug 1234173</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234174</URL>
      <Description>SUSE Bug 1234174</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234175</URL>
      <Description>SUSE Bug 1234175</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234176</URL>
      <Description>SUSE Bug 1234176</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234177</URL>
      <Description>SUSE Bug 1234177</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234178</URL>
      <Description>SUSE Bug 1234178</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234179</URL>
      <Description>SUSE Bug 1234179</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234180</URL>
      <Description>SUSE Bug 1234180</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234181</URL>
      <Description>SUSE Bug 1234181</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234182</URL>
      <Description>SUSE Bug 1234182</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234183</URL>
      <Description>SUSE Bug 1234183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234184</URL>
      <Description>SUSE Bug 1234184</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234185</URL>
      <Description>SUSE Bug 1234185</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234186</URL>
      <Description>SUSE Bug 1234186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234187</URL>
      <Description>SUSE Bug 1234187</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234188</URL>
      <Description>SUSE Bug 1234188</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234189</URL>
      <Description>SUSE Bug 1234189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234190</URL>
      <Description>SUSE Bug 1234190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234191</URL>
      <Description>SUSE Bug 1234191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234192</URL>
      <Description>SUSE Bug 1234192</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234193</URL>
      <Description>SUSE Bug 1234193</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234194</URL>
      <Description>SUSE Bug 1234194</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234195</URL>
      <Description>SUSE Bug 1234195</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234196</URL>
      <Description>SUSE Bug 1234196</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234197</URL>
      <Description>SUSE Bug 1234197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234198</URL>
      <Description>SUSE Bug 1234198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234199</URL>
      <Description>SUSE Bug 1234199</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234200</URL>
      <Description>SUSE Bug 1234200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234201</URL>
      <Description>SUSE Bug 1234201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234203</URL>
      <Description>SUSE Bug 1234203</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234204</URL>
      <Description>SUSE Bug 1234204</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234205</URL>
      <Description>SUSE Bug 1234205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234207</URL>
      <Description>SUSE Bug 1234207</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234208</URL>
      <Description>SUSE Bug 1234208</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234209</URL>
      <Description>SUSE Bug 1234209</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234219</URL>
      <Description>SUSE Bug 1234219</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234220</URL>
      <Description>SUSE Bug 1234220</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234221</URL>
      <Description>SUSE Bug 1234221</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234237</URL>
      <Description>SUSE Bug 1234237</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234238</URL>
      <Description>SUSE Bug 1234238</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234239</URL>
      <Description>SUSE Bug 1234239</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234240</URL>
      <Description>SUSE Bug 1234240</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234241</URL>
      <Description>SUSE Bug 1234241</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234242</URL>
      <Description>SUSE Bug 1234242</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234243</URL>
      <Description>SUSE Bug 1234243</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234278</URL>
      <Description>SUSE Bug 1234278</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234279</URL>
      <Description>SUSE Bug 1234279</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234280</URL>
      <Description>SUSE Bug 1234280</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234281</URL>
      <Description>SUSE Bug 1234281</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234282</URL>
      <Description>SUSE Bug 1234282</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234294</URL>
      <Description>SUSE Bug 1234294</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234338</URL>
      <Description>SUSE Bug 1234338</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234357</URL>
      <Description>SUSE Bug 1234357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234381</URL>
      <Description>SUSE Bug 1234381</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234454</URL>
      <Description>SUSE Bug 1234454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234464</URL>
      <Description>SUSE Bug 1234464</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234605</URL>
      <Description>SUSE Bug 1234605</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234651</URL>
      <Description>SUSE Bug 1234651</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234652</URL>
      <Description>SUSE Bug 1234652</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234654</URL>
      <Description>SUSE Bug 1234654</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234655</URL>
      <Description>SUSE Bug 1234655</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234657</URL>
      <Description>SUSE Bug 1234657</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234658</URL>
      <Description>SUSE Bug 1234658</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234659</URL>
      <Description>SUSE Bug 1234659</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234668</URL>
      <Description>SUSE Bug 1234668</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234690</URL>
      <Description>SUSE Bug 1234690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234725</URL>
      <Description>SUSE Bug 1234725</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234726</URL>
      <Description>SUSE Bug 1234726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234810</URL>
      <Description>SUSE Bug 1234810</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234811</URL>
      <Description>SUSE Bug 1234811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234826</URL>
      <Description>SUSE Bug 1234826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234827</URL>
      <Description>SUSE Bug 1234827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234829</URL>
      <Description>SUSE Bug 1234829</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234832</URL>
      <Description>SUSE Bug 1234832</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234834</URL>
      <Description>SUSE Bug 1234834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234843</URL>
      <Description>SUSE Bug 1234843</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234846</URL>
      <Description>SUSE Bug 1234846</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234848</URL>
      <Description>SUSE Bug 1234848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234853</URL>
      <Description>SUSE Bug 1234853</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234855</URL>
      <Description>SUSE Bug 1234855</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234856</URL>
      <Description>SUSE Bug 1234856</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234884</URL>
      <Description>SUSE Bug 1234884</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234889</URL>
      <Description>SUSE Bug 1234889</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234891</URL>
      <Description>SUSE Bug 1234891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234899</URL>
      <Description>SUSE Bug 1234899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234900</URL>
      <Description>SUSE Bug 1234900</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234905</URL>
      <Description>SUSE Bug 1234905</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234907</URL>
      <Description>SUSE Bug 1234907</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234909</URL>
      <Description>SUSE Bug 1234909</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234911</URL>
      <Description>SUSE Bug 1234911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234912</URL>
      <Description>SUSE Bug 1234912</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234916</URL>
      <Description>SUSE Bug 1234916</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234918</URL>
      <Description>SUSE Bug 1234918</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234920</URL>
      <Description>SUSE Bug 1234920</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234921</URL>
      <Description>SUSE Bug 1234921</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234922</URL>
      <Description>SUSE Bug 1234922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234929</URL>
      <Description>SUSE Bug 1234929</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234930</URL>
      <Description>SUSE Bug 1234930</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234937</URL>
      <Description>SUSE Bug 1234937</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234948</URL>
      <Description>SUSE Bug 1234948</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234950</URL>
      <Description>SUSE Bug 1234950</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234952</URL>
      <Description>SUSE Bug 1234952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234960</URL>
      <Description>SUSE Bug 1234960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234962</URL>
      <Description>SUSE Bug 1234962</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234963</URL>
      <Description>SUSE Bug 1234963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234968</URL>
      <Description>SUSE Bug 1234968</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234969</URL>
      <Description>SUSE Bug 1234969</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234970</URL>
      <Description>SUSE Bug 1234970</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234971</URL>
      <Description>SUSE Bug 1234971</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234973</URL>
      <Description>SUSE Bug 1234973</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234974</URL>
      <Description>SUSE Bug 1234974</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234989</URL>
      <Description>SUSE Bug 1234989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234999</URL>
      <Description>SUSE Bug 1234999</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235002</URL>
      <Description>SUSE Bug 1235002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235003</URL>
      <Description>SUSE Bug 1235003</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235004</URL>
      <Description>SUSE Bug 1235004</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235007</URL>
      <Description>SUSE Bug 1235007</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235009</URL>
      <Description>SUSE Bug 1235009</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235016</URL>
      <Description>SUSE Bug 1235016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235019</URL>
      <Description>SUSE Bug 1235019</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235033</URL>
      <Description>SUSE Bug 1235033</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235045</URL>
      <Description>SUSE Bug 1235045</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235056</URL>
      <Description>SUSE Bug 1235056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235061</URL>
      <Description>SUSE Bug 1235061</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235075</URL>
      <Description>SUSE Bug 1235075</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235108</URL>
      <Description>SUSE Bug 1235108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235128</URL>
      <Description>SUSE Bug 1235128</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235134</URL>
      <Description>SUSE Bug 1235134</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235138</URL>
      <Description>SUSE Bug 1235138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235246</URL>
      <Description>SUSE Bug 1235246</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235406</URL>
      <Description>SUSE Bug 1235406</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235409</URL>
      <Description>SUSE Bug 1235409</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235416</URL>
      <Description>SUSE Bug 1235416</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235507</URL>
      <Description>SUSE Bug 1235507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235550</URL>
      <Description>SUSE Bug 1235550</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26924/</URL>
      <Description>SUSE CVE CVE-2024-26924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27397/</URL>
      <Description>SUSE CVE CVE-2024-27397 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35839/</URL>
      <Description>SUSE CVE CVE-2024-35839 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36908/</URL>
      <Description>SUSE CVE CVE-2024-36908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36915/</URL>
      <Description>SUSE CVE CVE-2024-36915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39480/</URL>
      <Description>SUSE CVE CVE-2024-39480 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41042/</URL>
      <Description>SUSE CVE CVE-2024-41042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44934/</URL>
      <Description>SUSE CVE CVE-2024-44934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44996/</URL>
      <Description>SUSE CVE CVE-2024-44996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47678/</URL>
      <Description>SUSE CVE CVE-2024-47678 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49854/</URL>
      <Description>SUSE CVE CVE-2024-49854 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49884/</URL>
      <Description>SUSE CVE CVE-2024-49884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49915/</URL>
      <Description>SUSE CVE CVE-2024-49915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50016/</URL>
      <Description>SUSE CVE CVE-2024-50016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50018/</URL>
      <Description>SUSE CVE CVE-2024-50018 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50039/</URL>
      <Description>SUSE CVE CVE-2024-50039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50047/</URL>
      <Description>SUSE CVE CVE-2024-50047 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50143/</URL>
      <Description>SUSE CVE CVE-2024-50143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50154/</URL>
      <Description>SUSE CVE CVE-2024-50154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50202/</URL>
      <Description>SUSE CVE CVE-2024-50202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50203/</URL>
      <Description>SUSE CVE CVE-2024-50203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50211/</URL>
      <Description>SUSE CVE CVE-2024-50211 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50228/</URL>
      <Description>SUSE CVE CVE-2024-50228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50256/</URL>
      <Description>SUSE CVE CVE-2024-50256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50262/</URL>
      <Description>SUSE CVE CVE-2024-50262 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50272/</URL>
      <Description>SUSE CVE CVE-2024-50272 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50278/</URL>
      <Description>SUSE CVE CVE-2024-50278 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50279/</URL>
      <Description>SUSE CVE CVE-2024-50279 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50280/</URL>
      <Description>SUSE CVE CVE-2024-50280 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53050/</URL>
      <Description>SUSE CVE CVE-2024-53050 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53064/</URL>
      <Description>SUSE CVE CVE-2024-53064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53090/</URL>
      <Description>SUSE CVE CVE-2024-53090 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53099/</URL>
      <Description>SUSE CVE CVE-2024-53099 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53103/</URL>
      <Description>SUSE CVE CVE-2024-53103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53105/</URL>
      <Description>SUSE CVE CVE-2024-53105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53111/</URL>
      <Description>SUSE CVE CVE-2024-53111 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53113/</URL>
      <Description>SUSE CVE CVE-2024-53113 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53117/</URL>
      <Description>SUSE CVE CVE-2024-53117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53118/</URL>
      <Description>SUSE CVE CVE-2024-53118 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53119/</URL>
      <Description>SUSE CVE CVE-2024-53119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53120/</URL>
      <Description>SUSE CVE CVE-2024-53120 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53122/</URL>
      <Description>SUSE CVE CVE-2024-53122 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53125/</URL>
      <Description>SUSE CVE CVE-2024-53125 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53126/</URL>
      <Description>SUSE CVE CVE-2024-53126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53127/</URL>
      <Description>SUSE CVE CVE-2024-53127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53129/</URL>
      <Description>SUSE CVE CVE-2024-53129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53130/</URL>
      <Description>SUSE CVE CVE-2024-53130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53131/</URL>
      <Description>SUSE CVE CVE-2024-53131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53133/</URL>
      <Description>SUSE CVE CVE-2024-53133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53134/</URL>
      <Description>SUSE CVE CVE-2024-53134 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53136/</URL>
      <Description>SUSE CVE CVE-2024-53136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53141/</URL>
      <Description>SUSE CVE CVE-2024-53141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53142/</URL>
      <Description>SUSE CVE CVE-2024-53142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53144/</URL>
      <Description>SUSE CVE CVE-2024-53144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53146/</URL>
      <Description>SUSE CVE CVE-2024-53146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53148/</URL>
      <Description>SUSE CVE CVE-2024-53148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53150/</URL>
      <Description>SUSE CVE CVE-2024-53150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53151/</URL>
      <Description>SUSE CVE CVE-2024-53151 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53154/</URL>
      <Description>SUSE CVE CVE-2024-53154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53155/</URL>
      <Description>SUSE CVE CVE-2024-53155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53156/</URL>
      <Description>SUSE CVE CVE-2024-53156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53157/</URL>
      <Description>SUSE CVE CVE-2024-53157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53158/</URL>
      <Description>SUSE CVE CVE-2024-53158 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53159/</URL>
      <Description>SUSE CVE CVE-2024-53159 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53160/</URL>
      <Description>SUSE CVE CVE-2024-53160 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53161/</URL>
      <Description>SUSE CVE CVE-2024-53161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53162/</URL>
      <Description>SUSE CVE CVE-2024-53162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53166/</URL>
      <Description>SUSE CVE CVE-2024-53166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53169/</URL>
      <Description>SUSE CVE CVE-2024-53169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53171/</URL>
      <Description>SUSE CVE CVE-2024-53171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53173/</URL>
      <Description>SUSE CVE CVE-2024-53173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53174/</URL>
      <Description>SUSE CVE CVE-2024-53174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53179/</URL>
      <Description>SUSE CVE CVE-2024-53179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53180/</URL>
      <Description>SUSE CVE CVE-2024-53180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53188/</URL>
      <Description>SUSE CVE CVE-2024-53188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53190/</URL>
      <Description>SUSE CVE CVE-2024-53190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53191/</URL>
      <Description>SUSE CVE CVE-2024-53191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53200/</URL>
      <Description>SUSE CVE CVE-2024-53200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53201/</URL>
      <Description>SUSE CVE CVE-2024-53201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53202/</URL>
      <Description>SUSE CVE CVE-2024-53202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53206/</URL>
      <Description>SUSE CVE CVE-2024-53206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53207/</URL>
      <Description>SUSE CVE CVE-2024-53207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53208/</URL>
      <Description>SUSE CVE CVE-2024-53208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53209/</URL>
      <Description>SUSE CVE CVE-2024-53209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53210/</URL>
      <Description>SUSE CVE CVE-2024-53210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53213/</URL>
      <Description>SUSE CVE CVE-2024-53213 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53214/</URL>
      <Description>SUSE CVE CVE-2024-53214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53215/</URL>
      <Description>SUSE CVE CVE-2024-53215 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53216/</URL>
      <Description>SUSE CVE CVE-2024-53216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53217/</URL>
      <Description>SUSE CVE CVE-2024-53217 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53222/</URL>
      <Description>SUSE CVE CVE-2024-53222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53224/</URL>
      <Description>SUSE CVE CVE-2024-53224 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53229/</URL>
      <Description>SUSE CVE CVE-2024-53229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53234/</URL>
      <Description>SUSE CVE CVE-2024-53234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53237/</URL>
      <Description>SUSE CVE CVE-2024-53237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53240/</URL>
      <Description>SUSE CVE CVE-2024-53240 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53241/</URL>
      <Description>SUSE CVE CVE-2024-53241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56536/</URL>
      <Description>SUSE CVE CVE-2024-56536 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56539/</URL>
      <Description>SUSE CVE CVE-2024-56539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56549/</URL>
      <Description>SUSE CVE CVE-2024-56549 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56551/</URL>
      <Description>SUSE CVE CVE-2024-56551 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56562/</URL>
      <Description>SUSE CVE CVE-2024-56562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56566/</URL>
      <Description>SUSE CVE CVE-2024-56566 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56567/</URL>
      <Description>SUSE CVE CVE-2024-56567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56576/</URL>
      <Description>SUSE CVE CVE-2024-56576 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56582/</URL>
      <Description>SUSE CVE CVE-2024-56582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56599/</URL>
      <Description>SUSE CVE CVE-2024-56599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56604/</URL>
      <Description>SUSE CVE CVE-2024-56604 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56605/</URL>
      <Description>SUSE CVE CVE-2024-56605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56645/</URL>
      <Description>SUSE CVE CVE-2024-56645 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56667/</URL>
      <Description>SUSE CVE CVE-2024-56667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56752/</URL>
      <Description>SUSE CVE CVE-2024-56752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56754/</URL>
      <Description>SUSE CVE CVE-2024-56754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56755/</URL>
      <Description>SUSE CVE CVE-2024-56755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56756/</URL>
      <Description>SUSE CVE CVE-2024-56756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-8805/</URL>
      <Description>SUSE CVE CVE-2024-8805 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES15-SP6-Azure-Basic">
      <Branch Type="Product Name" Name="Image SLES15-SP6-Azure-Basic">
        <FullProductName ProductID="Image SLES15-SP6-Azure-Basic">Image SLES15-SP6-Azure-Basic</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP6-Azure-Standard">
      <Branch Type="Product Name" Name="Image SLES15-SP6-Azure-Standard">
        <FullProductName ProductID="Image SLES15-SP6-Azure-Standard">Image SLES15-SP6-Azure-Standard</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP6-HPC">
      <Branch Type="Product Name" Name="Image SLES15-SP6-HPC">
        <FullProductName ProductID="Image SLES15-SP6-HPC">Image SLES15-SP6-HPC</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP6-HPC-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP6-HPC-Azure">
        <FullProductName ProductID="Image SLES15-SP6-HPC-Azure">Image SLES15-SP6-HPC-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Public Cloud 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Public Cloud 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP6" CPE="cpe:/o:suse:sle-module-public-cloud:15:sp6">SUSE Linux Enterprise Module for Public Cloud 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-azure-6.4.0-150600.8.23.1">kernel-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="cluster-md-kmp-azure-6.4.0-150600.8.23.1">cluster-md-kmp-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="dlm-kmp-azure-6.4.0-150600.8.23.1">dlm-kmp-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="gfs2-kmp-azure-6.4.0-150600.8.23.1">gfs2-kmp-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-devel-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-azure-devel-6.4.0-150600.8.23.1">kernel-azure-devel-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-extra-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-azure-extra-6.4.0-150600.8.23.1">kernel-azure-extra-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-optional-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-azure-optional-6.4.0-150600.8.23.1">kernel-azure-optional-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-vdso-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-azure-vdso-6.4.0-150600.8.23.1">kernel-azure-vdso-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-devel-azure-6.4.0-150600.8.23.1">kernel-devel-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-source-azure-6.4.0-150600.8.23.1">kernel-source-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kernel-syms-azure-6.4.0-150600.8.23.1">kernel-syms-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="kselftests-kmp-azure-6.4.0-150600.8.23.1">kselftests-kmp-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="ocfs2-kmp-azure-6.4.0-150600.8.23.1">ocfs2-kmp-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-azure-6.4.0-150600.8.23.1">
      <FullProductName ProductID="reiserfs-kmp-azure-6.4.0-150600.8.23.1">reiserfs-kmp-azure-6.4.0-150600.8.23.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP6-Azure-Basic">
      <FullProductName ProductID="Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1">kernel-azure-6.4.0-150600.8.23.1 as a component of Image SLES15-SP6-Azure-Basic</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP6-Azure-Standard">
      <FullProductName ProductID="Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1">kernel-azure-6.4.0-150600.8.23.1 as a component of Image SLES15-SP6-Azure-Standard</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP6-HPC">
      <FullProductName ProductID="Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1">kernel-azure-6.4.0-150600.8.23.1 as a component of Image SLES15-SP6-HPC</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP6-HPC-Azure">
      <FullProductName ProductID="Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1">kernel-azure-6.4.0-150600.8.23.1 as a component of Image SLES15-SP6-HPC-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1">kernel-azure-6.4.0-150600.8.23.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1">kernel-azure-devel-6.4.0-150600.8.23.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1">kernel-devel-azure-6.4.0-150600.8.23.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1">kernel-source-azure-6.4.0-150600.8.23.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1">kernel-syms-azure-6.4.0-150600.8.23.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1">cluster-md-kmp-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1">dlm-kmp-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1">gfs2-kmp-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1">kernel-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1">kernel-azure-devel-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-extra-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1">kernel-azure-extra-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-optional-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1">kernel-azure-optional-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-vdso-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1">kernel-azure-vdso-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1">kernel-devel-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1">kernel-source-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1">kernel-syms-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kselftests-kmp-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1">kselftests-kmp-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1">ocfs2-kmp-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-azure-6.4.0-150600.8.23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1">reiserfs-kmp-azure-6.4.0-150600.8.23.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: do not free live element

Pablo reports a crash with large batches of elements with a
back-to-back add/remove pattern.  Quoting Pablo:

  add_elem("00000000") timeout 100 ms
  ...
  add_elem("0000000X") timeout 100 ms
  del_elem("0000000X") &lt;---------------- delete one that was just added
  ...
  add_elem("00005000") timeout 100 ms

  1) nft_pipapo_remove() removes element 0000000X
  Then, KASAN shows a splat.

Looking at the remove function there is a chance that we will drop a
rule that maps to a non-deactivated element.

Removal happens in two steps, first we do a lookup for key k and return the
to-be-removed element and mark it as inactive in the next generation.
Then, in a second step, the element gets removed from the set/map.

The _remove function does not work correctly if we have more than one
element that share the same key.

This can happen if we insert an element into a set when the set already
holds an element with same key, but the element mapping to the existing
key has timed out or is not active in the next generation.

In such case its possible that removal will unmap the wrong element.
If this happens, we will leak the non-deactivated element, it becomes
unreachable.

The element that got deactivated (and will be freed later) will
remain reachable in the set data structure, this can result in
a crash when such an element is retrieved during lookup (stale
pointer).

Add a check that the fully matching key does in fact map to the element
that we have marked as inactive in the deactivation step.
If not, we need to continue searching.

Add a bug/warn trap at the end of the function as well, the remove
function must not ever be called with an invisible/unreachable/non-existent
element.

v2: avoid uneeded temporary variable (Stefano)</Note>
    </Notes>
    <CVE>CVE-2024-26924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26924.html</URL>
        <Description>CVE-2024-26924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223387</URL>
        <Description>SUSE Bug 1223387</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: use timestamp to check for set element timeout

Add a timestamp field at the beginning of the transaction, store it
in the nftables per-netns area.

Update set backend .insert, .deactivate and sync gc path to use the
timestamp, this avoids that an element expires while control plane
transaction is still unfinished.

.lookup and .update, which are used from packet path, still use the
current time to check if the element has expired. And .get path and dump
also since this runs lockless under rcu read size lock. Then, there is
async gc which also needs to check the current time since it runs
asynchronously from a workqueue.</Note>
    </Notes>
    <CVE>CVE-2024-27397</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27397.html</URL>
        <Description>CVE-2024-27397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224095</URL>
        <Description>SUSE Bug 1224095</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: bridge: replace physindev with physinif in nf_bridge_info

An skb can be added to a neigh-&gt;arp_queue while waiting for an arp
reply. Where original skb's skb-&gt;dev can be different to neigh's
neigh-&gt;dev. For instance in case of bridging dnated skb from one veth to
another, the skb would be added to a neigh-&gt;arp_queue of the bridge.

As skb-&gt;dev can be reset back to nf_bridge-&gt;physindev and used, and as
there is no explicit mechanism that prevents this physindev from been
freed under us (for instance neigh_flush_dev doesn't cleanup skbs from
different device's neigh queue) we can crash on e.g. this stack:

arp_process
  neigh_update
    skb = __skb_dequeue(&amp;neigh-&gt;arp_queue)
      neigh_resolve_output(..., skb)
        ...
          br_nf_dev_xmit
            br_nf_pre_routing_finish_bridge_slow
              skb-&gt;dev = nf_bridge-&gt;physindev
              br_handle_frame_finish

Let's use plain ifindex instead of net_device link. To peek into the
original net_device we will use dev_get_by_index_rcu(). Thus either we
get device and are safe to use it or we don't get it and drop skb.</Note>
    </Notes>
    <CVE>CVE-2024-35839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35839.html</URL>
        <Description>CVE-2024-35839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224726</URL>
        <Description>SUSE Bug 1224726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: do not WARN if iocg was already offlined

In iocg_pay_debt(), warn is triggered if 'active_list' is empty, which
is intended to confirm iocg is active when it has debt. However, warn
can be triggered during a blkcg or disk removal, if iocg_waitq_timer_fn()
is run at that time:

  WARNING: CPU: 0 PID: 2344971 at block/blk-iocost.c:1402 iocg_pay_debt+0x14c/0x190
  Call trace:
  iocg_pay_debt+0x14c/0x190
  iocg_kick_waitq+0x438/0x4c0
  iocg_waitq_timer_fn+0xd8/0x130
  __run_hrtimer+0x144/0x45c
  __hrtimer_run_queues+0x16c/0x244
  hrtimer_interrupt+0x2cc/0x7b0

The warn in this situation is meaningless. Since this iocg is being
removed, the state of the 'active_list' is irrelevant, and 'waitq_timer'
is canceled after removing 'active_list' in ioc_pd_free(), which ensures
iocg is freed after iocg_waitq_timer_fn() returns.

Therefore, add the check if iocg was already offlined to avoid warn
when removing a blkcg or disk.</Note>
    </Notes>
    <CVE>CVE-2024-36908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36908.html</URL>
        <Description>CVE-2024-36908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225743</URL>
        <Description>SUSE Bug 1225743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies

syzbot reported unsafe calls to copy_from_sockptr() [1]

Use copy_safe_from_sockptr() instead.

[1]

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
Read of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078

CPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
  do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfd/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f7fac07fd89
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89
RDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000</Note>
    </Notes>
    <CVE>CVE-2024-36915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36915.html</URL>
        <Description>CVE-2024-36915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225758</URL>
        <Description>SUSE Bug 1225758</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

kdb: Fix buffer overflow during tab-complete

Currently, when the user attempts symbol completion with the Tab key, kdb
will use strncpy() to insert the completed symbol into the command buffer.
Unfortunately it passes the size of the source buffer rather than the
destination to strncpy() with predictably horrible results. Most obviously
if the command buffer is already full but cp, the cursor position, is in
the middle of the buffer, then we will write past the end of the supplied
buffer.

Fix this by replacing the dubious strncpy() calls with memmove()/memcpy()
calls plus explicit boundary checks to make sure we have enough space
before we start moving characters around.</Note>
    </Notes>
    <CVE>CVE-2024-39480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39480.html</URL>
        <Description>CVE-2024-39480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227445</URL>
        <Description>SUSE Bug 1227445</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: prefer nft_chain_validate

nft_chain_validate already performs loop detection because a cycle will
result in a call stack overflow (ctx-&gt;level &gt;= NFT_JUMP_STACK_SIZE).

It also follows maps via -&gt;validate callback in nft_lookup, so there
appears no reason to iterate the maps again.

nf_tables_check_loops() and all its helper functions can be removed.
This improves ruleset load time significantly, from 23s down to 12s.

This also fixes a crash bug. Old loop detection code can result in
unbounded recursion:

BUG: TASK stack guard page was hit at ....
Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN
CPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1
[..]

with a suitable ruleset during validation of register stores.

I can't see any actual reason to attempt to check for this from
nft_validate_register_store(), at this point the transaction is still in
progress, so we don't have a full picture of the rule graph.

For nf-next it might make sense to either remove it or make this depend
on table-&gt;validate_state in case we could catch an error earlier
(for improved error reporting to userspace).</Note>
    </Notes>
    <CVE>CVE-2024-41042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41042.html</URL>
        <Description>CVE-2024-41042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228526</URL>
        <Description>SUSE Bug 1228526</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mcast: wait for previous gc cycles when removing port

syzbot hit a use-after-free[1] which is caused because the bridge doesn't
make sure that all previous garbage has been collected when removing a
port. What happens is:
      CPU 1                   CPU 2
 start gc cycle           remove port
                         acquire gc lock first
 wait for lock
                         call br_multicasg_gc() directly
 acquire lock now but    free port
 the port can be freed
 while grp timers still
 running

Make sure all previous gc cycles have finished by using flush_work before
freeing the port.

[1]
  BUG: KASAN: slab-use-after-free in br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861
  Read of size 8 at addr ffff888071d6d000 by task syz.5.1232/9699

  CPU: 1 PID: 9699 Comm: syz.5.1232 Not tainted 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
  Call Trace:
   &lt;IRQ&gt;
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
   print_address_description mm/kasan/report.c:377 [inline]
   print_report+0xc3/0x620 mm/kasan/report.c:488
   kasan_report+0xd9/0x110 mm/kasan/report.c:601
   br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861
   call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792
   expire_timers kernel/time/timer.c:1843 [inline]
   __run_timers+0x74b/0xaf0 kernel/time/timer.c:2417
   __run_timer_base kernel/time/timer.c:2428 [inline]
   __run_timer_base kernel/time/timer.c:2421 [inline]
   run_timer_base+0x111/0x190 kernel/time/timer.c:2437</Note>
    </Notes>
    <CVE>CVE-2024-44934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44934.html</URL>
        <Description>CVE-2024-44934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229809</URL>
        <Description>SUSE Bug 1229809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock: fix recursive -&gt;recvmsg calls

After a vsock socket has been added to a BPF sockmap, its prot-&gt;recvmsg
has been replaced with vsock_bpf_recvmsg(). Thus the following
recursiion could happen:

vsock_bpf_recvmsg()
 -&gt; __vsock_recvmsg()
  -&gt; vsock_connectible_recvmsg()
   -&gt; prot-&gt;recvmsg()
    -&gt; vsock_bpf_recvmsg() again

We need to fix it by calling the original -&gt;recvmsg() without any BPF
sockmap logic in __vsock_recvmsg().</Note>
    </Notes>
    <CVE>CVE-2024-44996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44996.html</URL>
        <Description>CVE-2024-44996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230205</URL>
        <Description>SUSE Bug 1230205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

icmp: change the order of rate limits

ICMP messages are ratelimited :

After the blamed commits, the two rate limiters are applied in this order:

1) host wide ratelimit (icmp_global_allow())

2) Per destination ratelimit (inetpeer based)

In order to avoid side-channels attacks, we need to apply
the per destination check first.

This patch makes the following change :

1) icmp_global_allow() checks if the host wide limit is reached.
   But credits are not yet consumed. This is deferred to 3)

2) The per destination limit is checked/updated.
   This might add a new node in inetpeer tree.

3) icmp_global_consume() consumes tokens if prior operations succeeded.

This means that host wide ratelimit is still effective
in keeping inetpeer tree small even under DDOS.

As a bonus, I removed icmp_global.lock as the fast path
can use a lock-free operation.</Note>
    </Notes>
    <CVE>CVE-2024-47678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47678.html</URL>
        <Description>CVE-2024-47678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231854</URL>
        <Description>SUSE Bug 1231854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-49854</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49854.html</URL>
        <Description>CVE-2024-49854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232193</URL>
        <Description>SUSE Bug 1232193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236571</URL>
        <Description>SUSE Bug 1236571</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at()

We hit the following use-after-free:

==================================================================
BUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0
Read of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40
CPU: 0 PID: 40 Comm: kworker/u20:0 Not tainted 6.9.0-dirty #724
Call Trace:
 &lt;TASK&gt;
 kasan_report+0x93/0xc0
 ext4_split_extent_at+0xba8/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Allocated by task 40:
 __kmalloc_noprof+0x1ac/0x480
 ext4_find_extent+0xf3b/0x1e70
 ext4_ext_map_blocks+0x188/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Freed by task 40:
 kfree+0xf1/0x2b0
 ext4_find_extent+0xa71/0x1e70
 ext4_ext_insert_extent+0xa22/0x3260
 ext4_split_extent_at+0x3ef/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
==================================================================

The flow of issue triggering is as follows:

ext4_split_extent_at
  path = *ppath
  ext4_ext_insert_extent(ppath)
    ext4_ext_create_new_leaf(ppath)
      ext4_find_extent(orig_path)
        path = *orig_path
        read_extent_tree_block
          // return -ENOMEM or -EIO
        ext4_free_ext_path(path)
          kfree(path)
        *orig_path = NULL
  a. If err is -ENOMEM:
  ext4_ext_dirty(path + path-&gt;p_depth)
  // path use-after-free !!!
  b. If err is -EIO and we have EXT_DEBUG defined:
  ext4_ext_show_leaf(path)
    eh = path[depth].p_hdr
    // path also use-after-free !!!

So when trying to zeroout or fix the extent length, call ext4_find_extent()
to update the path.

In addition we use *ppath directly as an ext4_ext_show_leaf() input to
avoid possible use-after-free when EXT_DEBUG is defined, and to avoid
unnecessary path updates.</Note>
    </Notes>
    <CVE>CVE-2024-49884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49884.html</URL>
        <Description>CVE-2024-49884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232198</URL>
        <Description>SUSE Bug 1232198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw

This commit addresses a potential null pointer dereference issue in the
`dcn32_init_hw` function. The issue could occur when `dc-&gt;clk_mgr` is
null.

The fix adds a check to ensure `dc-&gt;clk_mgr` is not null before
accessing its functions. This prevents a potential null pointer
dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn32/dcn32_hwseq.c:961 dcn32_init_hw() error: we previously assumed 'dc-&gt;clk_mgr' could be null (see line 782)</Note>
    </Notes>
    <CVE>CVE-2024-49915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49915.html</URL>
        <Description>CVE-2024-49915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231963</URL>
        <Description>SUSE Bug 1231963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid overflow assignment in link_dp_cts

sampling_rate is an uint8_t but is assigned an unsigned int, and thus it
can overflow. As a result, sampling_rate is changed to uint32_t.

Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should
only be assigned to a value less or equal than 4.

This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-50016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50016.html</URL>
        <Description>CVE-2024-50016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232420</URL>
        <Description>SUSE Bug 1232420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-50018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50018.html</URL>
        <Description>CVE-2024-50018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232419</URL>
        <Description>SUSE Bug 1232419</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: accept TCA_STAB only for root qdisc

Most qdiscs maintain their backlog using qdisc_pkt_len(skb)
on the assumption it is invariant between the enqueue()
and dequeue() handlers.

Unfortunately syzbot can crash a host rather easily using
a TBF + SFQ combination, with an STAB on SFQ [1]

We can't support TCA_STAB on arbitrary level, this would
require to maintain per-qdisc storage.

[1]
[   88.796496] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   88.798611] #PF: supervisor read access in kernel mode
[   88.799014] #PF: error_code(0x0000) - not-present page
[   88.799506] PGD 0 P4D 0
[   88.799829] Oops: Oops: 0000 [#1] SMP NOPTI
[   88.800569] CPU: 14 UID: 0 PID: 2053 Comm: b371744477 Not tainted 6.12.0-rc1-virtme #1117
[   88.801107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   88.801779] RIP: 0010:sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq
[ 88.802544] Code: 0f b7 50 12 48 8d 04 d5 00 00 00 00 48 89 d6 48 29 d0 48 8b 91 c0 01 00 00 48 c1 e0 03 48 01 c2 66 83 7a 1a 00 7e c0 48 8b 3a &lt;4c&gt; 8b 07 4c 89 02 49 89 50 08 48 c7 47 08 00 00 00 00 48 c7 07 00
All code
========
   0:	0f b7 50 12          	movzwl 0x12(%rax),%edx
   4:	48 8d 04 d5 00 00 00 	lea    0x0(,%rdx,8),%rax
   b:	00
   c:	48 89 d6             	mov    %rdx,%rsi
   f:	48 29 d0             	sub    %rdx,%rax
  12:	48 8b 91 c0 01 00 00 	mov    0x1c0(%rcx),%rdx
  19:	48 c1 e0 03          	shl    $0x3,%rax
  1d:	48 01 c2             	add    %rax,%rdx
  20:	66 83 7a 1a 00       	cmpw   $0x0,0x1a(%rdx)
  25:	7e c0                	jle    0xffffffffffffffe7
  27:	48 8b 3a             	mov    (%rdx),%rdi
  2a:*	4c 8b 07             	mov    (%rdi),%r8		&lt;-- trapping instruction
  2d:	4c 89 02             	mov    %r8,(%rdx)
  30:	49 89 50 08          	mov    %rdx,0x8(%r8)
  34:	48 c7 47 08 00 00 00 	movq   $0x0,0x8(%rdi)
  3b:	00
  3c:	48                   	rex.W
  3d:	c7                   	.byte 0xc7
  3e:	07                   	(bad)
	...

Code starting with the faulting instruction
===========================================
   0:	4c 8b 07             	mov    (%rdi),%r8
   3:	4c 89 02             	mov    %r8,(%rdx)
   6:	49 89 50 08          	mov    %rdx,0x8(%r8)
   a:	48 c7 47 08 00 00 00 	movq   $0x0,0x8(%rdi)
  11:	00
  12:	48                   	rex.W
  13:	c7                   	.byte 0xc7
  14:	07                   	(bad)
	...
[   88.803721] RSP: 0018:ffff9a1f892b7d58 EFLAGS: 00000206
[   88.804032] RAX: 0000000000000000 RBX: ffff9a1f8420c800 RCX: ffff9a1f8420c800
[   88.804560] RDX: ffff9a1f81bc1440 RSI: 0000000000000000 RDI: 0000000000000000
[   88.805056] RBP: ffffffffc04bb0e0 R08: 0000000000000001 R09: 00000000ff7f9a1f
[   88.805473] R10: 000000000001001b R11: 0000000000009a1f R12: 0000000000000140
[   88.806194] R13: 0000000000000001 R14: ffff9a1f886df400 R15: ffff9a1f886df4ac
[   88.806734] FS:  00007f445601a740(0000) GS:ffff9a2e7fd80000(0000) knlGS:0000000000000000
[   88.807225] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   88.807672] CR2: 0000000000000000 CR3: 000000050cc46000 CR4: 00000000000006f0
[   88.808165] Call Trace:
[   88.808459]  &lt;TASK&gt;
[   88.808710] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)
[   88.809261] ? page_fault_oops (arch/x86/mm/fault.c:715)
[   88.809561] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:147 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539)
[   88.809806] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)
[   88.810074] ? sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq
[   88.810411] sfq_reset (net/sched/sch_sfq.c:525) sch_sfq
[   88.810671] qdisc_reset (./include/linux/skbuff.h:2135 ./include/linux/skbuff.h:2441 ./include/linux/skbuff.h:3304 ./include/linux/skbuff.h:3310 net/sched/sch_g
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50039.html</URL>
        <Description>CVE-2024-50039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231909</URL>
        <Description>SUSE Bug 1231909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in async decryption

Doing an async decryption (large read) crashes with a
slab-use-after-free way down in the crypto API.

Reproducer:
    # mount.cifs -o ...,seal,esize=1 //srv/share /mnt
    # dd if=/mnt/largefile of=/dev/null
    ...
    [  194.196391] ==================================================================
    [  194.196844] BUG: KASAN: slab-use-after-free in gf128mul_4k_lle+0xc1/0x110
    [  194.197269] Read of size 8 at addr ffff888112bd0448 by task kworker/u77:2/899
    [  194.197707]
    [  194.197818] CPU: 12 UID: 0 PID: 899 Comm: kworker/u77:2 Not tainted 6.11.0-lku-00028-gfca3ca14a17a-dirty #43
    [  194.198400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
    [  194.199046] Workqueue: smb3decryptd smb2_decrypt_offload [cifs]
    [  194.200032] Call Trace:
    [  194.200191]  &lt;TASK&gt;
    [  194.200327]  dump_stack_lvl+0x4e/0x70
    [  194.200558]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.200809]  print_report+0x174/0x505
    [  194.201040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
    [  194.201352]  ? srso_return_thunk+0x5/0x5f
    [  194.201604]  ? __virt_addr_valid+0xdf/0x1c0
    [  194.201868]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202128]  kasan_report+0xc8/0x150
    [  194.202361]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202616]  gf128mul_4k_lle+0xc1/0x110
    [  194.202863]  ghash_update+0x184/0x210
    [  194.203103]  shash_ahash_update+0x184/0x2a0
    [  194.203377]  ? __pfx_shash_ahash_update+0x10/0x10
    [  194.203651]  ? srso_return_thunk+0x5/0x5f
    [  194.203877]  ? crypto_gcm_init_common+0x1ba/0x340
    [  194.204142]  gcm_hash_assoc_remain_continue+0x10a/0x140
    [  194.204434]  crypt_message+0xec1/0x10a0 [cifs]
    [  194.206489]  ? __pfx_crypt_message+0x10/0x10 [cifs]
    [  194.208507]  ? srso_return_thunk+0x5/0x5f
    [  194.209205]  ? srso_return_thunk+0x5/0x5f
    [  194.209925]  ? srso_return_thunk+0x5/0x5f
    [  194.210443]  ? srso_return_thunk+0x5/0x5f
    [  194.211037]  decrypt_raw_data+0x15f/0x250 [cifs]
    [  194.212906]  ? __pfx_decrypt_raw_data+0x10/0x10 [cifs]
    [  194.214670]  ? srso_return_thunk+0x5/0x5f
    [  194.215193]  smb2_decrypt_offload+0x12a/0x6c0 [cifs]

This is because TFM is being used in parallel.

Fix this by allocating a new AEAD TFM for async decryption, but keep
the existing one for synchronous READ cases (similar to what is done
in smb3_calc_signature()).

Also remove the calls to aead_request_set_callback() and
crypto_wait_req() since it's always going to be a synchronous operation.</Note>
    </Notes>
    <CVE>CVE-2024-50047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50047.html</URL>
        <Description>CVE-2024-50047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232418</URL>
        <Description>SUSE Bug 1232418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232576</URL>
        <Description>SUSE Bug 1232576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232638</URL>
        <Description>SUSE Bug 1232638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

udf: fix uninit-value use in udf_get_fileshortad

Check for overflow when computing alen in udf_current_aext to mitigate
later uninit-value use in udf_get_fileshortad KMSAN bug[1].
After applying the patch reproducer did not trigger any issue[2].

[1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df
[2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000</Note>
    </Notes>
    <CVE>CVE-2024-50143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50143.html</URL>
        <Description>CVE-2024-50143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233038</URL>
        <Description>SUSE Bug 1233038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().

Martin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().

  """
  We are seeing a use-after-free from a bpf prog attached to
  trace_tcp_retransmit_synack. The program passes the req-&gt;sk to the
  bpf_sk_storage_get_tracing kernel helper which does check for null
  before using it.
  """

The commit 83fccfc3940c ("inet: fix potential deadlock in
reqsk_queue_unlink()") added timer_pending() in reqsk_queue_unlink() not
to call del_timer_sync() from reqsk_timer_handler(), but it introduced a
small race window.

Before the timer is called, expire_timers() calls detach_timer(timer, true)
to clear timer-&gt;entry.pprev and marks it as not pending.

If reqsk_queue_unlink() checks timer_pending() just after expire_timers()
calls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will
continue running and send multiple SYN+ACKs until it expires.

The reported UAF could happen if req-&gt;sk is close()d earlier than the timer
expiration, which is 63s by default.

The scenario would be

  1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),
     but del_timer_sync() is missed

  2. reqsk timer is executed and scheduled again

  3. req-&gt;sk is accept()ed and reqsk_put() decrements rsk_refcnt, but
     reqsk timer still has another one, and inet_csk_accept() does not
     clear req-&gt;sk for non-TFO sockets

  4. sk is close()d

  5. reqsk timer is executed again, and BPF touches req-&gt;sk

Let's not use timer_pending() by passing the caller context to
__inet_csk_reqsk_queue_drop().

Note that reqsk timer is pinned, so the issue does not happen in most
use cases. [1]

[0]
BUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0

Use-after-free read at 0x00000000a891fb3a (in kfence-#1):
bpf_sk_storage_get_tracing+0x2e/0x1b0
bpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda
bpf_trace_run2+0x4c/0xc0
tcp_rtx_synack+0xf9/0x100
reqsk_timer_handler+0xda/0x3d0
run_timer_softirq+0x292/0x8a0
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
intel_idle_irq+0x5a/0xa0
cpuidle_enter_state+0x94/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

kfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6

allocated by task 0 on cpu 9 at 260507.901592s:
sk_prot_alloc+0x35/0x140
sk_clone_lock+0x1f/0x3f0
inet_csk_clone_lock+0x15/0x160
tcp_create_openreq_child+0x1f/0x410
tcp_v6_syn_recv_sock+0x1da/0x700
tcp_check_req+0x1fb/0x510
tcp_v6_rcv+0x98b/0x1420
ipv6_list_rcv+0x2258/0x26e0
napi_complete_done+0x5b1/0x2990
mlx5e_napi_poll+0x2ae/0x8d0
net_rx_action+0x13e/0x590
irq_exit_rcu+0xf5/0x320
common_interrupt+0x80/0x90
asm_common_interrupt+0x22/0x40
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

freed by task 0 on cpu 9 at 260507.927527s:
rcu_core_si+0x4ff/0xf10
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb</Note>
    </Notes>
    <CVE>CVE-2024-50154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50154.html</URL>
        <Description>CVE-2024-50154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233070</URL>
        <Description>SUSE Bug 1233070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233072</URL>
        <Description>SUSE Bug 1233072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: propagate directory read errors from nilfs_find_entry()

Syzbot reported that a task hang occurs in vcs_open() during a fuzzing
test for nilfs2.

The root cause of this problem is that in nilfs_find_entry(), which
searches for directory entries, ignores errors when loading a directory
page/folio via nilfs_get_folio() fails.

If the filesystem images is corrupted, and the i_size of the directory
inode is large, and the directory page/folio is successfully read but
fails the sanity check, for example when it is zero-filled,
nilfs_check_folio() may continue to spit out error messages in bursts.

Fix this issue by propagating the error to the callers when loading a
page/folio fails in nilfs_find_entry().

The current interface of nilfs_find_entry() and its callers is outdated
and cannot propagate error codes such as -EIO and -ENOMEM returned via
nilfs_find_entry(), so fix it together.</Note>
    </Notes>
    <CVE>CVE-2024-50202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50202.html</URL>
        <Description>CVE-2024-50202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233324</URL>
        <Description>SUSE Bug 1233324</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf, arm64: Fix address emission with tag-based KASAN enabled

When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image
struct on the stack is passed during the size calculation pass and
an address on the heap is passed during code generation. This may
cause a heap buffer overflow if the heap address is tagged because
emit_a64_mov_i64() will emit longer code than it did during the size
calculation pass. The same problem could occur without tag-based
KASAN if one of the 16-bit words of the stack address happened to
be all-ones during the size calculation pass. Fix the problem by
assuming the worst case (4 instructions) when calculating the size
of the bpf_tramp_image address emission.</Note>
    </Notes>
    <CVE>CVE-2024-50203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50203.html</URL>
        <Description>CVE-2024-50203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233328</URL>
        <Description>SUSE Bug 1233328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

udf: refactor inode_bmap() to handle error

Refactor inode_bmap() to handle error since udf_next_aext() can return
error now. On situations like ftruncate, udf_extend_file() can now
detect errors and bail out early without resorting to checking for
particular offsets and assuming internal behavior of these functions.</Note>
    </Notes>
    <CVE>CVE-2024-50211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50211.html</URL>
        <Description>CVE-2024-50211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233096</URL>
        <Description>SUSE Bug 1233096</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-50228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50228.html</URL>
        <Description>CVE-2024-50228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233204</URL>
        <Description>SUSE Bug 1233204</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()

I got a syzbot report without a repro [1] crashing in nf_send_reset6()

I think the issue is that dev-&gt;hard_header_len is zero, and we attempt
later to push an Ethernet header.

Use LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c.

[1]

skbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
 RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
Code: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 &lt;0f&gt; 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
RSP: 0018:ffffc900045269b0 EFLAGS: 00010282
RAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800
RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000
RBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc
R10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140
R13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c
FS:  00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  skb_push+0xe5/0x100 net/core/skbuff.c:2636
  eth_header+0x38/0x1f0 net/ethernet/eth.c:83
  dev_hard_header include/linux/netdevice.h:3208 [inline]
  nf_send_reset6+0xce6/0x1270 net/ipv6/netfilter/nf_reject_ipv6.c:358
  nft_reject_inet_eval+0x3b9/0x690 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  br_nf_pre_routing_ipv6+0x63e/0x770 net/bridge/br_netfilter_ipv6.c:184
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
  br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
  __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5562
  __netif_receive_skb_one_core net/core/dev.c:5666 [inline]
  __netif_receive_skb+0x12f/0x650 net/core/dev.c:5781
  netif_receive_skb_internal net/core/dev.c:5867 [inline]
  netif_receive_skb+0x1e8/0x890 net/core/dev.c:5926
  tun_rx_batched+0x1b7/0x8f0 drivers/net/tun.c:1550
  tun_get_user+0x3056/0x47e0 drivers/net/tun.c:2007
  tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2053
  new_sync_write fs/read_write.c:590 [inline]
  vfs_write+0xa6d/0xc90 fs/read_write.c:683
  ksys_write+0x183/0x2b0 fs/read_write.c:736
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fdbeeb7d1ff
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48
RSP: 002b:00007fdbee5ff000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fdbeed36058 RCX: 00007fdbeeb7d1ff
RDX: 000000000000008e RSI: 0000000020000040 RDI: 00000000000000c8
RBP: 00007fdbeebf12be R08: 0000000
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50256.html</URL>
        <Description>CVE-2024-50256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233200</URL>
        <Description>SUSE Bug 1233200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix out-of-bounds write in trie_get_next_key()

trie_get_next_key() allocates a node stack with size trie-&gt;max_prefixlen,
while it writes (trie-&gt;max_prefixlen + 1) nodes to the stack when it has
full paths from the root to leaves. For example, consider a trie with
max_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ...
0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with
.prefixlen = 8 make 9 nodes be written on the node stack with size 8.</Note>
    </Notes>
    <CVE>CVE-2024-50262</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50262.html</URL>
        <Description>CVE-2024-50262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233239</URL>
        <Description>SUSE Bug 1233239</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

filemap: Fix bounds checking in filemap_read()

If the caller supplies an iocb-&gt;ki_pos value that is close to the
filesystem upper limit, and an iterator with a count that causes us to
overflow that limit, then filemap_read() enters an infinite loop.

This behaviour was discovered when testing xfstests generic/525 with the
"localio" optimisation for loopback NFS mounts.</Note>
    </Notes>
    <CVE>CVE-2024-50272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50272.html</URL>
        <Description>CVE-2024-50272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233461</URL>
        <Description>SUSE Bug 1233461</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix potential out-of-bounds access on the first resume

Out-of-bounds access occurs if the fast device is expanded unexpectedly
before the first-time resume of the cache table. This happens because
expanding the fast device requires reloading the cache table for
cache_create to allocate new in-core data structures that fit the new
size, and the check in cache_preresume is not performed during the
first resume, leading to the issue.

Reproduce steps:

1. prepare component devices:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct

2. load a cache table of 512 cache blocks, and deliberately expand the
   fast device before resuming the cache, making the in-core data
   structures inadequate.

dmsetup create cache --notable
dmsetup reload cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"
dmsetup reload cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

3. suspend the cache to write out the in-core dirty bitset and hint
   array, leading to out-of-bounds access to the dirty bitset at offset
   0x40:

dmsetup suspend cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80
  Read of size 8 at addr ffffc90000085040 by task dmsetup/90

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc90000085000, ffffc90000087000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
  &gt;ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8
                                             ^
   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by checking the size change on the first resume.</Note>
    </Notes>
    <CVE>CVE-2024-50278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50278.html</URL>
        <Description>CVE-2024-50278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233467</URL>
        <Description>SUSE Bug 1233467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233709</URL>
        <Description>SUSE Bug 1233709</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix out-of-bounds access to the dirty bitset when resizing

dm-cache checks the dirty bits of the cache blocks to be dropped when
shrinking the fast device, but an index bug in bitset iteration causes
out-of-bounds access.

Reproduce steps:

1. create a cache device of 1024 cache blocks (128 bytes dirty bitset)

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

2. shrink the fast device to 512 cache blocks, triggering out-of-bounds
   access to the dirty bitset (offset 0x80)

dmsetup suspend cache
dmsetup reload cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0
  Read of size 8 at addr ffffc900000f3080 by task dmsetup/131

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc900000f3000, ffffc900000f5000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  &gt;ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
                     ^
   ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by making the index post-incremented.</Note>
    </Notes>
    <CVE>CVE-2024-50279</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50279.html</URL>
        <Description>CVE-2024-50279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233468</URL>
        <Description>SUSE Bug 1233468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233708</URL>
        <Description>SUSE Bug 1233708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix flushing uninitialized delayed_work on cache_ctr error

An unexpected WARN_ON from flush_work() may occur when cache creation
fails, caused by destroying the uninitialized delayed_work waker in the
error path of cache_create(). For example, the warning appears on the
superblock checksum error.

Reproduce steps:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

Kernel logs:

(snip)
WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890

Fix by pulling out the cancel_delayed_work_sync() from the constructor's
error path. This patch doesn't affect the use-after-free fix for
concurrent dm_resume and dm_destroy (commit 6a459d8edbdb ("dm cache: Fix
UAF in destroy()")) as cache_dtr is not changed.</Note>
    </Notes>
    <CVE>CVE-2024-50280</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50280.html</URL>
        <Description>CVE-2024-50280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233469</URL>
        <Description>SUSE Bug 1233469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53050</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53050.html</URL>
        <Description>CVE-2024-53050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233546</URL>
        <Description>SUSE Bug 1233546</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53064.html</URL>
        <Description>CVE-2024-53064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233558</URL>
        <Description>SUSE Bug 1233558</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

afs: Fix lock recursion

afs_wake_up_async_call() can incur lock recursion.  The problem is that it
is called from AF_RXRPC whilst holding the -&gt;notify_lock, but it tries to
take a ref on the afs_call struct in order to pass it to a work queue - but
if the afs_call is already queued, we then have an extraneous ref that must
be put... calling afs_put_call() may call back down into AF_RXRPC through
rxrpc_kernel_shutdown_call(), however, which might try taking the
-&gt;notify_lock again.

This case isn't very common, however, so defer it to a workqueue.  The oops
looks something like:

  BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646
   lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0
  CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351
  Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x47/0x70
   do_raw_spin_lock+0x3c/0x90
   rxrpc_kernel_shutdown_call+0x83/0xb0
   afs_put_call+0xd7/0x180
   rxrpc_notify_socket+0xa0/0x190
   rxrpc_input_split_jumbo+0x198/0x1d0
   rxrpc_input_data+0x14b/0x1e0
   ? rxrpc_input_call_packet+0xc2/0x1f0
   rxrpc_input_call_event+0xad/0x6b0
   rxrpc_input_packet_on_conn+0x1e1/0x210
   rxrpc_input_packet+0x3f2/0x4d0
   rxrpc_io_thread+0x243/0x410
   ? __pfx_rxrpc_io_thread+0x10/0x10
   kthread+0xcf/0xe0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x24/0x40
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-53090</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53090.html</URL>
        <Description>CVE-2024-53090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233637</URL>
        <Description>SUSE Bug 1233637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Check validity of link-&gt;type in bpf_link_show_fdinfo()

If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing
bpf_link_type_strs[link-&gt;type] may result in an out-of-bounds access.

To spot such missed invocations early in the future, checking the
validity of link-&gt;type in bpf_link_show_fdinfo() and emitting a warning
when such invocations are missed.</Note>
    </Notes>
    <CVE>CVE-2024-53099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53099.html</URL>
        <Description>CVE-2024-53099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233772</URL>
        <Description>SUSE Bug 1233772</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer

When hvs is released, there is a possibility that vsk-&gt;trans may not
be initialized to NULL, which could lead to a dangling pointer.
This issue is resolved by initializing vsk-&gt;trans to NULL.</Note>
    </Notes>
    <CVE>CVE-2024-53103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53103.html</URL>
        <Description>CVE-2024-53103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234024</URL>
        <Description>SUSE Bug 1234024</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: page_alloc: move mlocked flag clearance into free_pages_prepare()

Syzbot reported a bad page state problem caused by a page being freed
using free_page() still having a mlocked flag at free_pages_prepare()
stage:

  BUG: Bad page state in process syz.5.504  pfn:61f45
  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61f45
  flags: 0xfff00000080204(referenced|workingset|mlocked|node=0|zone=1|lastcpupid=0x7ff)
  raw: 00fff00000080204 0000000000000000 dead000000000122 0000000000000000
  raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
  page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set
  page_owner tracks the page as allocated
  page last allocated via order 0, migratetype Unmovable, gfp_mask 0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), pid 8443, tgid 8442 (syz.5.504), ts 201884660643, free_ts 201499827394
   set_page_owner include/linux/page_owner.h:32 [inline]
   post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1537
   prep_new_page mm/page_alloc.c:1545 [inline]
   get_page_from_freelist+0x303f/0x3190 mm/page_alloc.c:3457
   __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4733
   alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265
   kvm_coalesced_mmio_init+0x1f/0xf0 virt/kvm/coalesced_mmio.c:99
   kvm_create_vm virt/kvm/kvm_main.c:1235 [inline]
   kvm_dev_ioctl_create_vm virt/kvm/kvm_main.c:5488 [inline]
   kvm_dev_ioctl+0x12dc/0x2240 virt/kvm/kvm_main.c:5530
   __do_compat_sys_ioctl fs/ioctl.c:1007 [inline]
   __se_compat_sys_ioctl+0x510/0xc90 fs/ioctl.c:950
   do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
   __do_fast_syscall_32+0xb4/0x110 arch/x86/entry/common.c:386
   do_fast_syscall_32+0x34/0x80 arch/x86/entry/common.c:411
   entry_SYSENTER_compat_after_hwframe+0x84/0x8e
  page last free pid 8399 tgid 8399 stack trace:
   reset_page_owner include/linux/page_owner.h:25 [inline]
   free_pages_prepare mm/page_alloc.c:1108 [inline]
   free_unref_folios+0xf12/0x18d0 mm/page_alloc.c:2686
   folios_put_refs+0x76c/0x860 mm/swap.c:1007
   free_pages_and_swap_cache+0x5c8/0x690 mm/swap_state.c:335
   __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline]
   tlb_batch_pages_flush mm/mmu_gather.c:149 [inline]
   tlb_flush_mmu_free mm/mmu_gather.c:366 [inline]
   tlb_flush_mmu+0x3a3/0x680 mm/mmu_gather.c:373
   tlb_finish_mmu+0xd4/0x200 mm/mmu_gather.c:465
   exit_mmap+0x496/0xc40 mm/mmap.c:1926
   __mmput+0x115/0x390 kernel/fork.c:1348
   exit_mm+0x220/0x310 kernel/exit.c:571
   do_exit+0x9b2/0x28e0 kernel/exit.c:926
   do_group_exit+0x207/0x2c0 kernel/exit.c:1088
   __do_sys_exit_group kernel/exit.c:1099 [inline]
   __se_sys_exit_group kernel/exit.c:1097 [inline]
   __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097
   x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  Modules linked in:
  CPU: 0 UID: 0 PID: 8442 Comm: syz.5.504 Not tainted 6.12.0-rc6-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:94 [inline]
   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
   bad_page+0x176/0x1d0 mm/page_alloc.c:501
   free_page_is_bad mm/page_alloc.c:918 [inline]
   free_pages_prepare mm/page_alloc.c:1100 [inline]
   free_unref_page+0xed0/0xf20 mm/page_alloc.c:2638
   kvm_destroy_vm virt/kvm/kvm_main.c:1327 [inline]
   kvm_put_kvm+0xc75/0x1350 virt/kvm/kvm_main.c:1386
   kvm_vcpu_release+0x54/0x60 virt/kvm/kvm_main.c:4143
   __fput+0x23f/0x880 fs/file_table.c:431
   task_work_run+0x24f/0x310 kernel/task_work.c:239
   exit_task_work include/linux/task_work.h:43 [inline]
   do_exit+0xa2f/0x28e0 kernel/exit.c:939
   do_group_exit+0x207/0x2c0 kernel/exit.c:1088
   __do_sys_exit_group kernel/exit.c:1099 [in
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-53105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53105.html</URL>
        <Description>CVE-2024-53105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234069</URL>
        <Description>SUSE Bug 1234069</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/mremap: fix address wraparound in move_page_tables()

On 32-bit platforms, it is possible for the expression `len + old_addr &lt;
old_end` to be false-positive if `len + old_addr` wraps around. 
`old_addr` is the cursor in the old range up to which page table entries
have been moved; so if the operation succeeded, `old_addr` is the *end* of
the old region, and adding `len` to it can wrap.

The overflow causes mremap() to mistakenly believe that PTEs have been
copied; the consequence is that mremap() bails out, but doesn't move the
PTEs back before the new VMA is unmapped, causing anonymous pages in the
region to be lost.  So basically if userspace tries to mremap() a
private-anon region and hits this bug, mremap() will return an error and
the private-anon region's contents appear to have been zeroed.

The idea of this check is that `old_end - len` is the original start
address, and writing the check that way also makes it easier to read; so
fix the check by rearranging the comparison accordingly.

(An alternate fix would be to refactor this function by introducing an
"orig_old_start" variable or such.)


Tested in a VM with a 32-bit X86 kernel; without the patch:

```
user@horn:~/big_mremap$ cat test.c
#define _GNU_SOURCE
#include &lt;stdlib.h&gt;
#include &lt;stdio.h&gt;
#include &lt;err.h&gt;
#include &lt;sys/mman.h&gt;

#define ADDR1 ((void*)0x60000000)
#define ADDR2 ((void*)0x10000000)
#define SIZE          0x50000000uL

int main(void) {
  unsigned char *p1 = mmap(ADDR1, SIZE, PROT_READ|PROT_WRITE,
      MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0);
  if (p1 == MAP_FAILED)
    err(1, "mmap 1");
  unsigned char *p2 = mmap(ADDR2, SIZE, PROT_NONE,
      MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0);
  if (p2 == MAP_FAILED)
    err(1, "mmap 2");
  *p1 = 0x41;
  printf("first char is 0x%02hhx\n", *p1);
  unsigned char *p3 = mremap(p1, SIZE, SIZE,
      MREMAP_MAYMOVE|MREMAP_FIXED, p2);
  if (p3 == MAP_FAILED) {
    printf("mremap() failed; first char is 0x%02hhx\n", *p1);
  } else {
    printf("mremap() succeeded; first char is 0x%02hhx\n", *p3);
  }
}
user@horn:~/big_mremap$ gcc -static -o test test.c
user@horn:~/big_mremap$ setarch -R ./test
first char is 0x41
mremap() failed; first char is 0x00
```

With the patch:

```
user@horn:~/big_mremap$ setarch -R ./test
first char is 0x41
mremap() succeeded; first char is 0x41
```</Note>
    </Notes>
    <CVE>CVE-2024-53111</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53111.html</URL>
        <Description>CVE-2024-53111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234086</URL>
        <Description>SUSE Bug 1234086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: fix NULL pointer dereference in alloc_pages_bulk_noprof

We triggered a NULL pointer dereference for ac.preferred_zoneref-&gt;zone in
alloc_pages_bulk_noprof() when the task is migrated between cpusets.

When cpuset is enabled, in prepare_alloc_pages(), ac-&gt;nodemask may be
&amp;current-&gt;mems_allowed.  when first_zones_zonelist() is called to find
preferred_zoneref, the ac-&gt;nodemask may be modified concurrently if the
task is migrated between different cpusets.  Assuming we have 2 NUMA Node,
when traversing Node1 in ac-&gt;zonelist, the nodemask is 2, and when
traversing Node2 in ac-&gt;zonelist, the nodemask is 1.  As a result, the
ac-&gt;preferred_zoneref points to NULL zone.

In alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() finds a
allowable zone and calls zonelist_node_idx(ac.preferred_zoneref), leading
to NULL pointer dereference.

__alloc_pages_noprof() fixes this issue by checking NULL pointer in commit
ea57485af8f4 ("mm, page_alloc: fix check for NULL preferred_zone") and
commit df76cee6bbeb ("mm, page_alloc: remove redundant checks from alloc
fastpath").

To fix it, check NULL pointer for preferred_zoneref-&gt;zone.</Note>
    </Notes>
    <CVE>CVE-2024-53113</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53113.html</URL>
        <Description>CVE-2024-53113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234077</URL>
        <Description>SUSE Bug 1234077</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

virtio/vsock: Improve MSG_ZEROCOPY error handling

Add a missing kfree_skb() to prevent memory leaks.</Note>
    </Notes>
    <CVE>CVE-2024-53117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53117.html</URL>
        <Description>CVE-2024-53117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234079</URL>
        <Description>SUSE Bug 1234079</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix sk_error_queue memory leak

Kernel queues MSG_ZEROCOPY completion notifications on the error queue.
Where they remain, until explicitly recv()ed. To prevent memory leaks,
clean up the queue when the socket is destroyed.

unreferenced object 0xffff8881028beb00 (size 224):
  comm "vsock_test", pid 1218, jiffies 4294694897
  hex dump (first 32 bytes):
    90 b0 21 17 81 88 ff ff 90 b0 21 17 81 88 ff ff  ..!.......!.....
    00 00 00 00 00 00 00 00 00 b0 21 17 81 88 ff ff  ..........!.....
  backtrace (crc 6c7031ca):
    [&lt;ffffffff81418ef7&gt;] kmem_cache_alloc_node_noprof+0x2f7/0x370
    [&lt;ffffffff81d35882&gt;] __alloc_skb+0x132/0x180
    [&lt;ffffffff81d2d32b&gt;] sock_omalloc+0x4b/0x80
    [&lt;ffffffff81d3a8ae&gt;] msg_zerocopy_realloc+0x9e/0x240
    [&lt;ffffffff81fe5cb2&gt;] virtio_transport_send_pkt_info+0x412/0x4c0
    [&lt;ffffffff81fe6183&gt;] virtio_transport_stream_enqueue+0x43/0x50
    [&lt;ffffffff81fe0813&gt;] vsock_connectible_sendmsg+0x373/0x450
    [&lt;ffffffff81d233d5&gt;] ____sys_sendmsg+0x365/0x3a0
    [&lt;ffffffff81d246f4&gt;] ___sys_sendmsg+0x84/0xd0
    [&lt;ffffffff81d26f47&gt;] __sys_sendmsg+0x47/0x80
    [&lt;ffffffff820d3df3&gt;] do_syscall_64+0x93/0x180
    [&lt;ffffffff8220012b&gt;] entry_SYSCALL_64_after_hwframe+0x76/0x7e</Note>
    </Notes>
    <CVE>CVE-2024-53118</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53118.html</URL>
        <Description>CVE-2024-53118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234071</URL>
        <Description>SUSE Bug 1234071</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

virtio/vsock: Fix accept_queue memory leak

As the final stages of socket destruction may be delayed, it is possible
that virtio_transport_recv_listen() will be called after the accept_queue
has been flushed, but before the SOCK_DONE flag has been set. As a result,
sockets enqueued after the flush would remain unremoved, leading to a
memory leak.

vsock_release
  __vsock_release
    lock
    virtio_transport_release
      virtio_transport_close
        schedule_delayed_work(close_work)
    sk_shutdown = SHUTDOWN_MASK
(!) flush accept_queue
    release
                                        virtio_transport_recv_pkt
                                          vsock_find_bound_socket
                                          lock
                                          if flag(SOCK_DONE) return
                                          virtio_transport_recv_listen
                                            child = vsock_create_connected
                                      (!)   vsock_enqueue_accept(child)
                                          release
close_work
  lock
  virtio_transport_do_close
    set_flag(SOCK_DONE)
    virtio_transport_remove_sock
      vsock_remove_sock
        vsock_remove_bound
  release

Introduce a sk_shutdown check to disallow vsock_enqueue_accept() during
socket destruction.

unreferenced object 0xffff888109e3f800 (size 2040):
  comm "kworker/5:2", pid 371, jiffies 4294940105
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    28 00 0b 40 00 00 00 00 00 00 00 00 00 00 00 00  (..@............
  backtrace (crc 9e5f4e84):
    [&lt;ffffffff81418ff1&gt;] kmem_cache_alloc_noprof+0x2c1/0x360
    [&lt;ffffffff81d27aa0&gt;] sk_prot_alloc+0x30/0x120
    [&lt;ffffffff81d2b54c&gt;] sk_alloc+0x2c/0x4b0
    [&lt;ffffffff81fe049a&gt;] __vsock_create.constprop.0+0x2a/0x310
    [&lt;ffffffff81fe6d6c&gt;] virtio_transport_recv_pkt+0x4dc/0x9a0
    [&lt;ffffffff81fe745d&gt;] vsock_loopback_work+0xfd/0x140
    [&lt;ffffffff810fc6ac&gt;] process_one_work+0x20c/0x570
    [&lt;ffffffff810fce3f&gt;] worker_thread+0x1bf/0x3a0
    [&lt;ffffffff811070dd&gt;] kthread+0xdd/0x110
    [&lt;ffffffff81044fdd&gt;] ret_from_fork+0x2d/0x50
    [&lt;ffffffff8100785a&gt;] ret_from_fork_asm+0x1a/0x30</Note>
    </Notes>
    <CVE>CVE-2024-53119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53119.html</URL>
        <Description>CVE-2024-53119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234073</URL>
        <Description>SUSE Bug 1234073</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: CT: Fix null-ptr-deref in add rule err flow

In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add()
callback returns error, zone_rule-&gt;attr is used uninitiated. Fix it to
use attr which has the needed pointer value.

Kernel log:
 BUG: kernel NULL pointer dereference, address: 0000000000000110
 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]
…
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x20/0x70
  ? page_fault_oops+0x150/0x3e0
  ? exc_page_fault+0x74/0x140
  ? asm_exc_page_fault+0x22/0x30
  ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]
  ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core]
  mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core]
  ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]
  nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]
  flow_offload_work_handler+0x142/0x320 [nf_flow_table]
  ? finish_task_switch.isra.0+0x15b/0x2b0
  process_one_work+0x16c/0x320
  worker_thread+0x28c/0x3a0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0xb8/0xf0
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x2d/0x50
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-53120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53120.html</URL>
        <Description>CVE-2024-53120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234075</URL>
        <Description>SUSE Bug 1234075</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mptcp: cope racing subflow creation in mptcp_rcv_space_adjust

Additional active subflows - i.e. created by the in kernel path
manager - are included into the subflow list before starting the
3whs.

A racing recvmsg() spooling data received on an already established
subflow would unconditionally call tcp_cleanup_rbuf() on all the
current subflows, potentially hitting a divide by zero error on
the newly created ones.

Explicitly check that the subflow is in a suitable state before
invoking tcp_cleanup_rbuf().</Note>
    </Notes>
    <CVE>CVE-2024-53122</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53122.html</URL>
        <Description>CVE-2024-53122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234076</URL>
        <Description>SUSE Bug 1234076</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: sync_linked_regs() must preserve subreg_def

Range propagation must not affect subreg_def marks, otherwise the
following example is rewritten by verifier incorrectly when
BPF_F_TEST_RND_HI32 flag is set:

  0: call bpf_ktime_get_ns                   call bpf_ktime_get_ns
  1: r0 &amp;= 0x7fffffff       after verifier   r0 &amp;= 0x7fffffff
  2: w1 = w0                rewrites         w1 = w0
  3: if w0 &lt; 10 goto +0     --------------&gt;  r11 = 0x2f5674a6     (r)
  4: r1 &gt;&gt;= 32                               r11 &lt;&lt;= 32           (r)
  5: r0 = r1                                 r1 |= r11            (r)
  6: exit;                                   if w0 &lt; 0xa goto pc+0
                                             r1 &gt;&gt;= 32
                                             r0 = r1
                                             exit

(or zero extension of w1 at (2) is missing for architectures that
 require zero extension for upper register half).

The following happens w/o this patch:
- r0 is marked as not a subreg at (0);
- w1 is marked as subreg at (2);
- w1 subreg_def is overridden at (3) by copy_register_state();
- w1 is read at (5) but mark_insn_zext() does not mark (2)
  for zero extension, because w1 subreg_def is not set;
- because of BPF_F_TEST_RND_HI32 flag verifier inserts random
  value for hi32 bits of (2) (marked (r));
- this random value is read at (5).</Note>
    </Notes>
    <CVE>CVE-2024-53125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53125.html</URL>
        <Description>CVE-2024-53125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234156</URL>
        <Description>SUSE Bug 1234156</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vdpa: solidrun: Fix UB bug with devres

In psnet_open_pf_bar() and snet_open_vf_bar() a string later passed to
pcim_iomap_regions() is placed on the stack. Neither
pcim_iomap_regions() nor the functions it calls copy that string.

Should the string later ever be used, this, consequently, causes
undefined behavior since the stack frame will by then have disappeared.

Fix the bug by allocating the strings on the heap through
devm_kasprintf().</Note>
    </Notes>
    <CVE>CVE-2024-53126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53126.html</URL>
        <Description>CVE-2024-53126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234158</URL>
        <Description>SUSE Bug 1234158</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"

The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages
bigger than 4K") increased the max_req_size, even for 4K pages, causing
various issues:
- Panic booting the kernel/rootfs from an SD card on Rockchip RK3566
- Panic booting the kernel/rootfs from an SD card on StarFive JH7100
- "swiotlb buffer is full" and data corruption on StarFive JH7110

At this stage no fix have been found, so it's probably better to just
revert the change.

This reverts commit 8396c793ffdf28bb8aee7cfe0891080f8cab7890.</Note>
    </Notes>
    <CVE>CVE-2024-53127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53127.html</URL>
        <Description>CVE-2024-53127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234153</URL>
        <Description>SUSE Bug 1234153</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/rockchip: vop: Fix a dereferenced before check warning

The 'state' can't be NULL, we should check crtc_state.

Fix warning:
drivers/gpu/drm/rockchip/rockchip_drm_vop.c:1096
vop_plane_atomic_async_check() warn: variable dereferenced before check
'state' (see line 1077)</Note>
    </Notes>
    <CVE>CVE-2024-53129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53129.html</URL>
        <Description>CVE-2024-53129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234155</URL>
        <Description>SUSE Bug 1234155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint

When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty()
may cause a NULL pointer dereference, or a general protection fault when
KASAN is enabled.

This happens because, since the tracepoint was added in
mark_buffer_dirty(), it references the dev_t member bh-&gt;b_bdev-&gt;bd_dev
regardless of whether the buffer head has a pointer to a block_device
structure.

In the current implementation, nilfs_grab_buffer(), which grabs a buffer
to read (or create) a block of metadata, including b-tree node blocks,
does not set the block device, but instead does so only if the buffer is
not in the "uptodate" state for each of its caller block reading
functions.  However, if the uptodate flag is set on a folio/page, and the
buffer heads are detached from it by try_to_free_buffers(), and new buffer
heads are then attached by create_empty_buffers(), the uptodate flag may
be restored to each buffer without the block device being set to
bh-&gt;b_bdev, and mark_buffer_dirty() may be called later in that state,
resulting in the bug mentioned above.

Fix this issue by making nilfs_grab_buffer() always set the block device
of the super block structure to the buffer head, regardless of the state
of the buffer's uptodate flag.</Note>
    </Notes>
    <CVE>CVE-2024-53130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53130.html</URL>
        <Description>CVE-2024-53130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234219</URL>
        <Description>SUSE Bug 1234219</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint

Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints".

This series fixes null pointer dereference bugs that occur when using
nilfs2 and two block-related tracepoints.


This patch (of 2):

It has been reported that when using "block:block_touch_buffer"
tracepoint, touch_buffer() called from __nilfs_get_folio_block() causes a
NULL pointer dereference, or a general protection fault when KASAN is
enabled.

This happens because since the tracepoint was added in touch_buffer(), it
references the dev_t member bh-&gt;b_bdev-&gt;bd_dev regardless of whether the
buffer head has a pointer to a block_device structure.  In the current
implementation, the block_device structure is set after the function
returns to the caller.

Here, touch_buffer() is used to mark the folio/page that owns the buffer
head as accessed, but the common search helper for folio/page used by the
caller function was optimized to mark the folio/page as accessed when it
was reimplemented a long time ago, eliminating the need to call
touch_buffer() here in the first place.

So this solves the issue by eliminating the touch_buffer() call itself.</Note>
    </Notes>
    <CVE>CVE-2024-53131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53131.html</URL>
        <Description>CVE-2024-53131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234220</URL>
        <Description>SUSE Bug 1234220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Handle dml allocation failure to avoid crash

[Why]
In the case where a dml allocation fails for any reason, the
current state's dml contexts would no longer be valid. Then
subsequent calls dc_state_copy_internal would shallow copy
invalid memory and if the new state was released, a double
free would occur.

[How]
Reset dml pointers in new_state to NULL and avoid invalid
pointer

(cherry picked from commit bcafdc61529a48f6f06355d78eb41b3aeda5296c)</Note>
    </Notes>
    <CVE>CVE-2024-53133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53133.html</URL>
        <Description>CVE-2024-53133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234221</URL>
        <Description>SUSE Bug 1234221</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx93-blk-ctrl: correct remove path

The check condition should be 'i &lt; bc-&gt;onecell_data.num_domains', not
'bc-&gt;onecell_data.num_domains' which will make the look never finish
and cause kernel panic.

Also disable runtime to address
"imx93-blk-ctrl 4ac10000.system-controller: Unbalanced pm_runtime_enable!"</Note>
    </Notes>
    <CVE>CVE-2024-53134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53134.html</URL>
        <Description>CVE-2024-53134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234159</URL>
        <Description>SUSE Bug 1234159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: revert "mm: shmem: fix data-race in shmem_getattr()"

Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1].  It is causing deadlocks when accessing tmpfs over
NFS.

As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem".</Note>
    </Notes>
    <CVE>CVE-2024-53136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53136.html</URL>
        <Description>CVE-2024-53136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234161</URL>
        <Description>SUSE Bug 1234161</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: add missing range check in bitmap_ip_uadt

When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,
the values of ip and ip_to are slightly swapped. Therefore, the range check
for ip should be done later, but this part is missing and it seems that the
vulnerability occurs.

So we should add missing range checks and remove unnecessary range checks.</Note>
    </Notes>
    <CVE>CVE-2024-53141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53141.html</URL>
        <Description>CVE-2024-53141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234381</URL>
        <Description>SUSE Bug 1234381</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

initramfs: avoid filename buffer overrun

The initramfs filename field is defined in
Documentation/driver-api/early-userspace/buffer-format.rst as:

 37 cpio_file := ALGN(4) + cpio_header + filename + "\0" + ALGN(4) + data
...
 55 ============= ================== =========================
 56 Field name    Field size         Meaning
 57 ============= ================== =========================
...
 70 c_namesize    8 bytes            Length of filename, including final \0

When extracting an initramfs cpio archive, the kernel's do_name() path
handler assumes a zero-terminated path at @collected, passing it
directly to filp_open() / init_mkdir() / init_mknod().

If a specially crafted cpio entry carries a non-zero-terminated filename
and is followed by uninitialized memory, then a file may be created with
trailing characters that represent the uninitialized memory. The ability
to create an initramfs entry would imply already having full control of
the system, so the buffer overrun shouldn't be considered a security
vulnerability.

Append the output of the following bash script to an existing initramfs
and observe any created /initramfs_test_fname_overrunAA* path. E.g.
  ./reproducer.sh | gzip &gt;&gt; /myinitramfs

It's easiest to observe non-zero uninitialized memory when the output is
gzipped, as it'll overflow the heap allocated @out_buf in __gunzip(),
rather than the initrd_start+initrd_size block.

---- reproducer.sh ----
nilchar="A"	# change to "\0" to properly zero terminate / pad
magic="070701"
ino=1
mode=$(( 0100777 ))
uid=0
gid=0
nlink=1
mtime=1
filesize=0
devmajor=0
devminor=1
rdevmajor=0
rdevminor=0
csum=0
fname="initramfs_test_fname_overrun"
namelen=$(( ${#fname} + 1 ))	# plus one to account for terminator

printf "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s" \
	$magic $ino $mode $uid $gid $nlink $mtime $filesize \
	$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname

termpadlen=$(( 1 + ((4 - ((110 + $namelen) &amp; 3)) % 4) ))
printf "%.s${nilchar}" $(seq 1 $termpadlen)
---- reproducer.sh ----

Symlink filename fields handled in do_symlink() won't overrun past the
data segment, due to the explicit zero-termination of the symlink
target.

Fix filename buffer overrun by aborting the initramfs FSM if any cpio
entry doesn't carry a zero-terminator at the expected (name_len - 1)
offset.</Note>
    </Notes>
    <CVE>CVE-2024-53142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53142.html</URL>
        <Description>CVE-2024-53142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232436</URL>
        <Description>SUSE Bug 1232436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE

This aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4
("Bluetooth: Always request for user confirmation for Just Works")
always request user confirmation with confirm_hint set since the
likes of bluetoothd have dedicated policy around JUST_WORKS method
(e.g. main.conf:JustWorksRepairing).

CVE: CVE-2024-8805</Note>
    </Notes>
    <CVE>CVE-2024-53144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53144.html</URL>
        <Description>CVE-2024-53144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234690</URL>
        <Description>SUSE Bug 1234690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent a potential integer overflow

If the tag length is &gt;= U32_MAX - 3 then the "length + 4" addition
can result in an integer overflow. Address this by splitting the
decoding into several steps so that decode_cb_compound4res() does
not have to perform arithmetic on the unsafe length value.</Note>
    </Notes>
    <CVE>CVE-2024-53146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53146.html</URL>
        <Description>CVE-2024-53146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234854</URL>
        <Description>SUSE Bug 1234854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

comedi: Flush partial mappings in error case

If some remap_pfn_range() calls succeeded before one failed, we still have
buffer pages mapped into the userspace page tables when we drop the buffer
reference with comedi_buf_map_put(bm). The userspace mappings are only
cleaned up later in the mmap error path.

Fix it by explicitly flushing all mappings in our VMA on the error path.

See commit 79a61cc3fc04 ("mm: avoid leaving partial pfn mappings around in
error case").</Note>
    </Notes>
    <CVE>CVE-2024-53148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53148.html</URL>
        <Description>CVE-2024-53148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234832</URL>
        <Description>SUSE Bug 1234832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234833</URL>
        <Description>SUSE Bug 1234833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix out of bounds reads when finding clock sources

The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors.  That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.

For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal.  When the descriptor
length is shorter than expected, it's skipped in the loop.

For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.</Note>
    </Notes>
    <CVE>CVE-2024-53150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53150.html</URL>
        <Description>CVE-2024-53150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234834</URL>
        <Description>SUSE Bug 1234834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

svcrdma: Address an integer overflow

Dan Carpenter reports:
&gt; Commit 78147ca8b4a9 ("svcrdma: Add a "parsed chunk list" data
&gt; structure") from Jun 22, 2020 (linux-next), leads to the following
&gt; Smatch static checker warning:
&gt;
&gt;	net/sunrpc/xprtrdma/svc_rdma_recvfrom.c:498 xdr_check_write_chunk()
&gt;	warn: potential user controlled sizeof overflow 'segcount * 4 * 4'
&gt;
&gt; net/sunrpc/xprtrdma/svc_rdma_recvfrom.c
&gt;     488 static bool xdr_check_write_chunk(struct svc_rdma_recv_ctxt *rctxt)
&gt;     489 {
&gt;     490         u32 segcount;
&gt;     491         __be32 *p;
&gt;     492
&gt;     493         if (xdr_stream_decode_u32(&amp;rctxt-&gt;rc_stream, &amp;segcount))
&gt;                                                               ^^^^^^^^
&gt;
&gt;     494                 return false;
&gt;     495
&gt;     496         /* A bogus segcount causes this buffer overflow check to fail. */
&gt;     497         p = xdr_inline_decode(&amp;rctxt-&gt;rc_stream,
&gt; --&gt; 498                               segcount * rpcrdma_segment_maxsz * sizeof(*p));
&gt;
&gt;
&gt; segcount is an untrusted u32.  On 32bit systems anything &gt;= SIZE_MAX / 16 will
&gt; have an integer overflow and some those values will be accepted by
&gt; xdr_inline_decode().</Note>
    </Notes>
    <CVE>CVE-2024-53151</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53151.html</URL>
        <Description>CVE-2024-53151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234829</URL>
        <Description>SUSE Bug 1234829</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: clk-apple-nco: Add NULL check in applnco_probe

Add NULL check in applnco_probe, to handle kernel NULL pointer
dereference error.</Note>
    </Notes>
    <CVE>CVE-2024-53154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53154.html</URL>
        <Description>CVE-2024-53154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234826</URL>
        <Description>SUSE Bug 1234826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix uninitialized value in ocfs2_file_read_iter()

Syzbot has reported the following KMSAN splat:

BUG: KMSAN: uninit-value in ocfs2_file_read_iter+0x9a4/0xf80
 ocfs2_file_read_iter+0x9a4/0xf80
 __io_read+0x8d4/0x20f0
 io_read+0x3e/0xf0
 io_issue_sqe+0x42b/0x22c0
 io_wq_submit_work+0xaf9/0xdc0
 io_worker_handle_work+0xd13/0x2110
 io_wq_worker+0x447/0x1410
 ret_from_fork+0x6f/0x90
 ret_from_fork_asm+0x1a/0x30

Uninit was created at:
 __alloc_pages_noprof+0x9a7/0xe00
 alloc_pages_mpol_noprof+0x299/0x990
 alloc_pages_noprof+0x1bf/0x1e0
 allocate_slab+0x33a/0x1250
 ___slab_alloc+0x12ef/0x35e0
 kmem_cache_alloc_bulk_noprof+0x486/0x1330
 __io_alloc_req_refill+0x84/0x560
 io_submit_sqes+0x172f/0x2f30
 __se_sys_io_uring_enter+0x406/0x41c0
 __x64_sys_io_uring_enter+0x11f/0x1a0
 x64_sys_call+0x2b54/0x3ba0
 do_syscall_64+0xcd/0x1e0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Since an instance of 'struct kiocb' may be passed from the block layer
with 'private' field uninitialized, introduce 'ocfs2_iocb_init_rw_locked()'
and use it from where 'ocfs2_dio_end_io()' might take care, i.e. in
'ocfs2_file_read_iter()' and 'ocfs2_file_write_iter()'.</Note>
    </Notes>
    <CVE>CVE-2024-53155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53155.html</URL>
        <Description>CVE-2024-53155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234855</URL>
        <Description>SUSE Bug 1234855</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()

I found the following bug in my fuzzer:

  UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51
  index 255 is out of range for type 'htc_endpoint [22]'
  CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  Workqueue: events request_firmware_work_func
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x180/0x1b0
   __ubsan_handle_out_of_bounds+0xd4/0x130
   htc_issue_send.constprop.0+0x20c/0x230
   ? _raw_spin_unlock_irqrestore+0x3c/0x70
   ath9k_wmi_cmd+0x41d/0x610
   ? mark_held_locks+0x9f/0xe0
   ...

Since this bug has been confirmed to be caused by insufficient verification
of conn_rsp_epid, I think it would be appropriate to add a range check for
conn_rsp_epid to htc_connect_service() to prevent the bug from occurring.</Note>
    </Notes>
    <CVE>CVE-2024-53156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53156.html</URL>
        <Description>CVE-2024-53156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234846</URL>
        <Description>SUSE Bug 1234846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234847</URL>
        <Description>SUSE Bug 1234847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware

Fix a kernel crash with the below call trace when the SCPI firmware
returns OPP count of zero.

dvfs_info.opp_count may be zero on some platforms during the reboot
test, and the kernel will crash after dereferencing the pointer to
kcalloc(info-&gt;count, sizeof(*opp), GFP_KERNEL).

  |  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028
  |  Mem abort info:
  |    ESR = 0x96000004
  |    Exception class = DABT (current EL), IL = 32 bits
  |    SET = 0, FnV = 0
  |    EA = 0, S1PTW = 0
  |  Data abort info:
  |    ISV = 0, ISS = 0x00000004
  |    CM = 0, WnR = 0
  |  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c
  |  [0000000000000028] pgd=0000000000000000
  |  Internal error: Oops: 96000004 [#1] SMP
  |  scpi-hwmon: probe of PHYT000D:00 failed with error -110
  |  Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)
  |  CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1
  |  Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS
  |  pstate: 60000005 (nZCv daif -PAN -UAO)
  |  pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]
  |  lr : clk_register+0x438/0x720
  |  Call trace:
  |   scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]
  |   devm_clk_hw_register+0x50/0xa0
  |   scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]
  |   scpi_clocks_probe+0x528/0x70c [clk_scpi]
  |   platform_drv_probe+0x58/0xa8
  |   really_probe+0x260/0x3d0
  |   driver_probe_device+0x12c/0x148
  |   device_driver_attach+0x74/0x98
  |   __driver_attach+0xb4/0xe8
  |   bus_for_each_dev+0x88/0xe0
  |   driver_attach+0x30/0x40
  |   bus_add_driver+0x178/0x2b0
  |   driver_register+0x64/0x118
  |   __platform_driver_register+0x54/0x60
  |   scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]
  |   do_one_initcall+0x54/0x220
  |   do_init_module+0x54/0x1c8
  |   load_module+0x14a4/0x1668
  |   __se_sys_finit_module+0xf8/0x110
  |   __arm64_sys_finit_module+0x24/0x30
  |   el0_svc_common+0x78/0x170
  |   el0_svc_handler+0x38/0x78
  |   el0_svc+0x8/0x340
  |  Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)
  |  ---[ end trace 06feb22469d89fa8 ]---
  |  Kernel panic - not syncing: Fatal exception
  |  SMP: stopping secondary CPUs
  |  Kernel Offset: disabled
  |  CPU features: 0x10,a0002008
  |  Memory Limit: none</Note>
    </Notes>
    <CVE>CVE-2024-53157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53157.html</URL>
        <Description>CVE-2024-53157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234827</URL>
        <Description>SUSE Bug 1234827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()

This loop is supposed to break if the frequency returned from
clk_round_rate() is the same as on the previous iteration.  However,
that check doesn't make sense on the first iteration through the loop.
It leads to reading before the start of these-&gt;clk_perf_tbl[] array.</Note>
    </Notes>
    <CVE>CVE-2024-53158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53158.html</URL>
        <Description>CVE-2024-53158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234811</URL>
        <Description>SUSE Bug 1234811</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-53159</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53159.html</URL>
        <Description>CVE-2024-53159</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234848</URL>
        <Description>SUSE Bug 1234848</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu

KCSAN reports a data race when access the krcp-&gt;monitor_work.timer.expires
variable in the schedule_delayed_monitor_work() function:

&lt;snip&gt;
BUG: KCSAN: data-race in __mod_timer / kvfree_call_rcu

read to 0xffff888237d1cce8 of 8 bytes by task 10149 on cpu 1:
 schedule_delayed_monitor_work kernel/rcu/tree.c:3520 [inline]
 kvfree_call_rcu+0x3b8/0x510 kernel/rcu/tree.c:3839
 trie_update_elem+0x47c/0x620 kernel/bpf/lpm_trie.c:441
 bpf_map_update_value+0x324/0x350 kernel/bpf/syscall.c:203
 generic_map_update_batch+0x401/0x520 kernel/bpf/syscall.c:1849
 bpf_map_do_batch+0x28c/0x3f0 kernel/bpf/syscall.c:5143
 __sys_bpf+0x2e5/0x7a0
 __do_sys_bpf kernel/bpf/syscall.c:5741 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5739 [inline]
 __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5739
 x64_sys_call+0x2625/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

write to 0xffff888237d1cce8 of 8 bytes by task 56 on cpu 0:
 __mod_timer+0x578/0x7f0 kernel/time/timer.c:1173
 add_timer_global+0x51/0x70 kernel/time/timer.c:1330
 __queue_delayed_work+0x127/0x1a0 kernel/workqueue.c:2523
 queue_delayed_work_on+0xdf/0x190 kernel/workqueue.c:2552
 queue_delayed_work include/linux/workqueue.h:677 [inline]
 schedule_delayed_monitor_work kernel/rcu/tree.c:3525 [inline]
 kfree_rcu_monitor+0x5e8/0x660 kernel/rcu/tree.c:3643
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 56 Comm: kworker/u8:4 Not tainted 6.12.0-rc2-syzkaller-00050-g5b7c893ed5ed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events_unbound kfree_rcu_monitor
&lt;snip&gt;

kfree_rcu_monitor() rearms the work if a "krcp" has to be still
offloaded and this is done without holding krcp-&gt;lock, whereas
the kvfree_call_rcu() holds it.

Fix it by acquiring the "krcp-&gt;lock" for kfree_rcu_monitor() so
both functions do not race anymore.</Note>
    </Notes>
    <CVE>CVE-2024-53160</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53160.html</URL>
        <Description>CVE-2024-53160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234810</URL>
        <Description>SUSE Bug 1234810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

EDAC/bluefield: Fix potential integer overflow

The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx
left-shifted 16 bits and OR-ed with DIMM index.  With mem_ctrl_idx defined as
32-bits wide the left-shift operation truncates the upper 16 bits of
information during the calculation of the SMC argument.

The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any
potential integer overflow, i.e. loss of data from upper 16 bits.</Note>
    </Notes>
    <CVE>CVE-2024-53161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53161.html</URL>
        <Description>CVE-2024-53161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234856</URL>
        <Description>SUSE Bug 1234856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: qat/qat_4xxx - fix off by one in uof_get_name()

The fw_objs[] array has "num_objs" elements so the &gt; needs to be &gt;= to
prevent an out of bounds read.</Note>
    </Notes>
    <CVE>CVE-2024-53162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53162.html</URL>
        <Description>CVE-2024-53162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234843</URL>
        <Description>SUSE Bug 1234843</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix bfqq uaf in bfq_limit_depth()

Set new allocated bfqq to bic or remove freed bfqq from bic are both
protected by bfqd-&gt;lock, however bfq_limit_depth() is deferencing bfqq
from bic without the lock, this can lead to UAF if the io_context is
shared by multiple tasks.

For example, test bfq with io_uring can trigger following UAF in v6.6:

==================================================================
BUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50

Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x47/0x80
 print_address_description.constprop.0+0x66/0x300
 print_report+0x3e/0x70
 kasan_report+0xb4/0xf0
 bfqq_group+0x15/0x50
 bfqq_request_over_limit+0x130/0x9a0
 bfq_limit_depth+0x1b5/0x480
 __blk_mq_alloc_requests+0x2b5/0xa00
 blk_mq_get_new_requests+0x11d/0x1d0
 blk_mq_submit_bio+0x286/0xb00
 submit_bio_noacct_nocheck+0x331/0x400
 __block_write_full_folio+0x3d0/0x640
 writepage_cb+0x3b/0xc0
 write_cache_pages+0x254/0x6c0
 write_cache_pages+0x254/0x6c0
 do_writepages+0x192/0x310
 filemap_fdatawrite_wbc+0x95/0xc0
 __filemap_fdatawrite_range+0x99/0xd0
 filemap_write_and_wait_range.part.0+0x4d/0xa0
 blkdev_read_iter+0xef/0x1e0
 io_read+0x1b6/0x8a0
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Allocated by task 808602:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_slab_alloc+0x83/0x90
 kmem_cache_alloc_node+0x1b1/0x6d0
 bfq_get_queue+0x138/0xfa0
 bfq_get_bfqq_handle_split+0xe3/0x2c0
 bfq_init_rq+0x196/0xbb0
 bfq_insert_request.isra.0+0xb5/0x480
 bfq_insert_requests+0x156/0x180
 blk_mq_insert_request+0x15d/0x440
 blk_mq_submit_bio+0x8a4/0xb00
 submit_bio_noacct_nocheck+0x331/0x400
 __blkdev_direct_IO_async+0x2dd/0x330
 blkdev_write_iter+0x39a/0x450
 io_write+0x22a/0x840
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork+0x2d/0x50
 ret_from_fork_asm+0x1b/0x30

Freed by task 808589:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 __kasan_slab_free+0x126/0x1b0
 kmem_cache_free+0x10c/0x750
 bfq_put_queue+0x2dd/0x770
 __bfq_insert_request.isra.0+0x155/0x7a0
 bfq_insert_request.isra.0+0x122/0x480
 bfq_insert_requests+0x156/0x180
 blk_mq_dispatch_plug_list+0x528/0x7e0
 blk_mq_flush_plug_list.part.0+0xe5/0x590
 __blk_flush_plug+0x3b/0x90
 blk_finish_plug+0x40/0x60
 do_writepages+0x19d/0x310
 filemap_fdatawrite_wbc+0x95/0xc0
 __filemap_fdatawrite_range+0x99/0xd0
 filemap_write_and_wait_range.part.0+0x4d/0xa0
 blkdev_read_iter+0xef/0x1e0
 io_read+0x1b6/0x8a0
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork+0x2d/0x50
 ret_from_fork_asm+0x1b/0x30

Fix the problem by protecting bic_to_bfqq() with bfqd-&gt;lock.</Note>
    </Notes>
    <CVE>CVE-2024-53166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53166.html</URL>
        <Description>CVE-2024-53166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234884</URL>
        <Description>SUSE Bug 1234884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234885</URL>
        <Description>SUSE Bug 1234885</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-fabrics: fix kernel crash while shutting down controller

The nvme keep-alive operation, which executes at a periodic interval,
could potentially sneak in while shutting down a fabric controller.
This may lead to a race between the fabric controller admin queue
destroy code path (invoked while shutting down controller) and hw/hctx
queue dispatcher called from the nvme keep-alive async request queuing
operation. This race could lead to the kernel crash shown below:

Call Trace:
    autoremove_wake_function+0x0/0xbc (unreliable)
    __blk_mq_sched_dispatch_requests+0x114/0x24c
    blk_mq_sched_dispatch_requests+0x44/0x84
    blk_mq_run_hw_queue+0x140/0x220
    nvme_keep_alive_work+0xc8/0x19c [nvme_core]
    process_one_work+0x200/0x4e0
    worker_thread+0x340/0x504
    kthread+0x138/0x140
    start_kernel_thread+0x14/0x18

While shutting down fabric controller, if nvme keep-alive request sneaks
in then it would be flushed off. The nvme_keep_alive_end_io function is
then invoked to handle the end of the keep-alive operation which
decrements the admin-&gt;q_usage_counter and assuming this is the last/only
request in the admin queue then the admin-&gt;q_usage_counter becomes zero.
If that happens then blk-mq destroy queue operation (blk_mq_destroy_
queue()) which could be potentially running simultaneously on another
cpu (as this is the controller shutdown code path) would forward
progress and deletes the admin queue. So, now from this point onward
we are not supposed to access the admin queue resources. However the
issue here's that the nvme keep-alive thread running hw/hctx queue
dispatch operation hasn't yet finished its work and so it could still
potentially access the admin queue resource while the admin queue had
been already deleted and that causes the above crash.

The above kernel crash is regression caused due to changes implemented
in commit a54a93d0e359 ("nvme: move stopping keep-alive into
nvme_uninit_ctrl()"). Ideally we should stop keep-alive before destroyin
g the admin queue and freeing the admin tagset so that it wouldn't sneak
in during the shutdown operation. However we removed the keep alive stop
operation from the beginning of the controller shutdown code path in commit
a54a93d0e359 ("nvme: move stopping keep-alive into nvme_uninit_ctrl()")
and added it under nvme_uninit_ctrl() which executes very late in the
shutdown code path after the admin queue is destroyed and its tagset is
removed. So this change created the possibility of keep-alive sneaking in
and interfering with the shutdown operation and causing observed kernel
crash.

To fix the observed crash, we decided to move nvme_stop_keep_alive() from
nvme_uninit_ctrl() to nvme_remove_admin_tag_set(). This change would ensure
that we don't forward progress and delete the admin queue until the keep-
alive operation is finished (if it's in-flight) or cancelled and that would
help contain the race condition explained above and hence avoid the crash.

Moving nvme_stop_keep_alive() to nvme_remove_admin_tag_set() instead of
adding nvme_stop_keep_alive() to the beginning of the controller shutdown
code path in nvme_stop_ctrl(), as was the case earlier before commit
a54a93d0e359 ("nvme: move stopping keep-alive into nvme_uninit_ctrl()"),
would help save one callsite of nvme_stop_keep_alive().</Note>
    </Notes>
    <CVE>CVE-2024-53169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53169.html</URL>
        <Description>CVE-2024-53169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234900</URL>
        <Description>SUSE Bug 1234900</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit

After an insertion in TNC, the tree might split and cause a node to
change its `znode-&gt;parent`. A further deletion of other nodes in the
tree (which also could free the nodes), the aforementioned node's
`znode-&gt;cparent` could still point to a freed node. This
`znode-&gt;cparent` may not be updated when getting nodes to commit in
`ubifs_tnc_start_commit()`. This could then trigger a use-after-free
when accessing the `znode-&gt;cparent` in `write_index()` in
`ubifs_tnc_end_commit()`.

This can be triggered by running

  rm -f /etc/test-file.bin
  dd if=/dev/urandom of=/etc/test-file.bin bs=1M count=60 conv=fsync

in a loop, and with `CONFIG_UBIFS_FS_AUTHENTICATION`. KASAN then
reports:

  BUG: KASAN: use-after-free in ubifs_tnc_end_commit+0xa5c/0x1950
  Write of size 32 at addr ffffff800a3af86c by task ubifs_bgt0_20/153

  Call trace:
   dump_backtrace+0x0/0x340
   show_stack+0x18/0x24
   dump_stack_lvl+0x9c/0xbc
   print_address_description.constprop.0+0x74/0x2b0
   kasan_report+0x1d8/0x1f0
   kasan_check_range+0xf8/0x1a0
   memcpy+0x84/0xf4
   ubifs_tnc_end_commit+0xa5c/0x1950
   do_commit+0x4e0/0x1340
   ubifs_bg_thread+0x234/0x2e0
   kthread+0x36c/0x410
   ret_from_fork+0x10/0x20

  Allocated by task 401:
   kasan_save_stack+0x38/0x70
   __kasan_kmalloc+0x8c/0xd0
   __kmalloc+0x34c/0x5bc
   tnc_insert+0x140/0x16a4
   ubifs_tnc_add+0x370/0x52c
   ubifs_jnl_write_data+0x5d8/0x870
   do_writepage+0x36c/0x510
   ubifs_writepage+0x190/0x4dc
   __writepage+0x58/0x154
   write_cache_pages+0x394/0x830
   do_writepages+0x1f0/0x5b0
   filemap_fdatawrite_wbc+0x170/0x25c
   file_write_and_wait_range+0x140/0x190
   ubifs_fsync+0xe8/0x290
   vfs_fsync_range+0xc0/0x1e4
   do_fsync+0x40/0x90
   __arm64_sys_fsync+0x34/0x50
   invoke_syscall.constprop.0+0xa8/0x260
   do_el0_svc+0xc8/0x1f0
   el0_svc+0x34/0x70
   el0t_64_sync_handler+0x108/0x114
   el0t_64_sync+0x1a4/0x1a8

  Freed by task 403:
   kasan_save_stack+0x38/0x70
   kasan_set_track+0x28/0x40
   kasan_set_free_info+0x28/0x4c
   __kasan_slab_free+0xd4/0x13c
   kfree+0xc4/0x3a0
   tnc_delete+0x3f4/0xe40
   ubifs_tnc_remove_range+0x368/0x73c
   ubifs_tnc_remove_ino+0x29c/0x2e0
   ubifs_jnl_delete_inode+0x150/0x260
   ubifs_evict_inode+0x1d4/0x2e4
   evict+0x1c8/0x450
   iput+0x2a0/0x3c4
   do_unlinkat+0x2cc/0x490
   __arm64_sys_unlinkat+0x90/0x100
   invoke_syscall.constprop.0+0xa8/0x260
   do_el0_svc+0xc8/0x1f0
   el0_svc+0x34/0x70
   el0t_64_sync_handler+0x108/0x114
   el0t_64_sync+0x1a4/0x1a8

The offending `memcpy()` in `ubifs_copy_hash()` has a use-after-free
when a node becomes root in TNC but still has a `cparent` to an already
freed node. More specifically, consider the following TNC:

         zroot
         /
        /
      zp1
      /
     /
    zn

Inserting a new node `zn_new` with a key smaller then `zn` will trigger
a split in `tnc_insert()` if `zp1` is full:

         zroot
         /   \
        /     \
      zp1     zp2
      /         \
     /           \
  zn_new          zn

`zn-&gt;parent` has now been moved to `zp2`, *but* `zn-&gt;cparent` still
points to `zp1`.

Now, consider a removal of all the nodes _except_ `zn`. Just when
`tnc_delete()` is about to delete `zroot` and `zp2`:

         zroot
             \
              \
              zp2
                \
                 \
                 zn

`zroot` and `zp2` get freed and the tree collapses:

           zn

`zn` now becomes the new `zroot`.

`get_znodes_to_commit()` will now only find `zn`, the new `zroot`, and
`write_index()` will check its `znode-&gt;cparent` that wrongly points to
the already freed `zp1`. `ubifs_copy_hash()` thus gets wrongly called
with `znode-&gt;cparent-&gt;zbranch[znode-&gt;iip].hash` that triggers the
use-after-free!

Fix this by explicitly setting `znode-&gt;cparent` to `NULL` in
`get_znodes_to_commit()` for the root node. The search for the dirty
nodes
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-53171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53171.html</URL>
        <Description>CVE-2024-53171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234889</URL>
        <Description>SUSE Bug 1234889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236234</URL>
        <Description>SUSE Bug 1236234</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSv4.0: Fix a use-after-free problem in the asynchronous open()

Yang Erkun reports that when two threads are opening files at the same
time, and are forced to abort before a reply is seen, then the call to
nfs_release_seqid() in nfs4_opendata_free() can result in a
use-after-free of the pointer to the defunct rpc task of the other
thread.
The fix is to ensure that if the RPC call is aborted before the call to
nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()
in nfs4_open_release() before the rpc_task is freed.</Note>
    </Notes>
    <CVE>CVE-2024-53173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53173.html</URL>
        <Description>CVE-2024-53173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234891</URL>
        <Description>SUSE Bug 1234891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234892</URL>
        <Description>SUSE Bug 1234892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: make sure cache entry active before cache_show

The function `c_show` was called with protection from RCU. This only
ensures that `cp` will not be freed. Therefore, the reference count for
`cp` can drop to zero, which will trigger a refcount use-after-free
warning when `cache_get` is called. To resolve this issue, use
`cache_get_rcu` to ensure that `cp` remains active.

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 7 PID: 822 at lib/refcount.c:25
refcount_warn_saturate+0xb1/0x120
CPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:refcount_warn_saturate+0xb1/0x120

Call Trace:
 &lt;TASK&gt;
 c_show+0x2fc/0x380 [sunrpc]
 seq_read_iter+0x589/0x770
 seq_read+0x1e5/0x270
 proc_reg_read+0xe1/0x140
 vfs_read+0x125/0x530
 ksys_read+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e</Note>
    </Notes>
    <CVE>CVE-2024-53174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53174.html</URL>
        <Description>CVE-2024-53174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234899</URL>
        <Description>SUSE Bug 1234899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free of signing key

Customers have reported use-after-free in @ses-&gt;auth_key.response with
SMB2.1 + sign mounts which occurs due to following race:

task A                         task B
cifs_mount()
 dfs_mount_share()
  get_session()
   cifs_mount_get_session()    cifs_send_recv()
    cifs_get_smb_ses()          compound_send_recv()
     cifs_setup_session()        smb2_setup_request()
      kfree_sensitive()           smb2_calc_signature()
                                   crypto_shash_setkey() *UAF*

Fix this by ensuring that we have a valid @ses-&gt;auth_key.response by
checking whether @ses-&gt;ses_status is SES_GOOD or SES_EXITING with
@ses-&gt;ses_lock held.  After commit 24a9799aa8ef ("smb: client: fix UAF
in smb2_reconnect_server()"), we made sure to call -&gt;logoff() only
when @ses was known to be good (e.g. valid -&gt;auth_key.response), so
it's safe to access signing key when @ses-&gt;ses_status == SES_EXITING.</Note>
    </Notes>
    <CVE>CVE-2024-53179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53179.html</URL>
        <Description>CVE-2024-53179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234921</URL>
        <Description>SUSE Bug 1234921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234927</URL>
        <Description>SUSE Bug 1234927</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Add sanity NULL check for the default mmap fault handler

A driver might allow the mmap access before initializing its
runtime-&gt;dma_area properly.  Add a proper NULL check before passing to
virt_to_page() for avoiding a panic.</Note>
    </Notes>
    <CVE>CVE-2024-53180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53180.html</URL>
        <Description>CVE-2024-53180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234929</URL>
        <Description>SUSE Bug 1234929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix crash when unbinding

If there is an error during some initialization related to firmware,
the function ath12k_dp_cc_cleanup is called to release resources.
However this is released again when the device is unbinded (ath12k_pci),
and we get:
BUG: kernel NULL pointer dereference, address: 0000000000000020
at RIP: 0010:ath12k_dp_cc_cleanup.part.0+0xb6/0x500 [ath12k]
Call Trace:
ath12k_dp_cc_cleanup
ath12k_dp_free
ath12k_core_deinit
ath12k_pci_remove
...

The issue is always reproducible from a VM because the MSI addressing
initialization is failing.

In order to fix the issue, just set to NULL the released structure in
ath12k_dp_cc_cleanup at the end.</Note>
    </Notes>
    <CVE>CVE-2024-53188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53188.html</URL>
        <Description>CVE-2024-53188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234948</URL>
        <Description>SUSE Bug 1234948</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures

Syzkaller reported a hung task with uevent_show() on stack trace. That
specific issue was addressed by another commit [0], but even with that
fix applied (for example, running v6.12-rc5) we face another type of hung
task that comes from the same reproducer [1]. By investigating that, we
could narrow it to the following path:

(a) Syzkaller emulates a Realtek USB WiFi adapter using raw-gadget and
dummy_hcd infrastructure.

(b) During the probe of rtl8192cu, the driver ends-up performing an efuse
read procedure (which is related to EEPROM load IIUC), and here lies the
issue: the function read_efuse() calls read_efuse_byte() many times, as
loop iterations depending on the efuse size (in our example, 512 in total).

This procedure for reading efuse bytes relies in a loop that performs an
I/O read up to *10k* times in case of failures. We measured the time of
the loop inside read_efuse_byte() alone, and in this reproducer (which
involves the dummy_hcd emulation layer), it takes 15 seconds each. As a
consequence, we have the driver stuck in its probe routine for big time,
exposing a stack trace like below if we attempt to reboot the system, for
example:

task:kworker/0:3 state:D stack:0 pid:662 tgid:662 ppid:2 flags:0x00004000
Workqueue: usb_hub_wq hub_event
Call Trace:
 __schedule+0xe22/0xeb6
 schedule_timeout+0xe7/0x132
 __wait_for_common+0xb5/0x12e
 usb_start_wait_urb+0xc5/0x1ef
 ? usb_alloc_urb+0x95/0xa4
 usb_control_msg+0xff/0x184
 _usbctrl_vendorreq_sync+0xa0/0x161
 _usb_read_sync+0xb3/0xc5
 read_efuse_byte+0x13c/0x146
 read_efuse+0x351/0x5f0
 efuse_read_all_map+0x42/0x52
 rtl_efuse_shadow_map_update+0x60/0xef
 rtl_get_hwinfo+0x5d/0x1c2
 rtl92cu_read_eeprom_info+0x10a/0x8d5
 ? rtl92c_read_chip_version+0x14f/0x17e
 rtl_usb_probe+0x323/0x851
 usb_probe_interface+0x278/0x34b
 really_probe+0x202/0x4a4
 __driver_probe_device+0x166/0x1b2
 driver_probe_device+0x2f/0xd8
 [...]

We propose hereby to drastically reduce the attempts of doing the I/O
reads in case of failures, restricted to USB devices (given that
they're inherently slower than PCIe ones). By retrying up to 10 times
(instead of 10000), we got reponsiveness in the reproducer, while seems
reasonable to believe that there's no sane USB device implementation in
the field requiring this amount of retries at every I/O read in order
to properly work. Based on that assumption, it'd be good to have it
backported to stable but maybe not since driver implementation (the 10k
number comes from day 0), perhaps up to 6.x series makes sense.

[0] Commit 15fffc6a5624 ("driver core: Fix uevent_show() vs driver detach race")

[1] A note about that: this syzkaller report presents multiple reproducers
that differs by the type of emulated USB device. For this specific case,
check the entry from 2024/08/08 06:23 in the list of crashes; the C repro
is available at https://syzkaller.appspot.com/text?tag=ReproC&amp;x=1521fc83980000.</Note>
    </Notes>
    <CVE>CVE-2024-53190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53190.html</URL>
        <Description>CVE-2024-53190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234950</URL>
        <Description>SUSE Bug 1234950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix warning when unbinding

If there is an error during some initialization related to firmware,
the buffers dp-&gt;tx_ring[i].tx_status are released.
However this is released again when the device is unbinded (ath12k_pci),
and we get:
WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80
Call Trace:
free_large_kmalloc
ath12k_dp_free
ath12k_core_deinit
ath12k_pci_remove
...

The issue is always reproducible from a VM because the MSI addressing
initialization is failing.

In order to fix the issue, just set the buffers to NULL after releasing in
order to avoid the double free.</Note>
    </Notes>
    <CVE>CVE-2024-53191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53191.html</URL>
        <Description>CVE-2024-53191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234952</URL>
        <Description>SUSE Bug 1234952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null check for pipe_ctx-&gt;plane_state in hwss_setup_dpp

This commit addresses a null pointer dereference issue in
hwss_setup_dpp(). The issue could occur when pipe_ctx-&gt;plane_state is
null. The fix adds a check to ensure `pipe_ctx-&gt;plane_state` is not null
before accessing. This prevents a null pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2024-53200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53200.html</URL>
        <Description>CVE-2024-53200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234968</URL>
        <Description>SUSE Bug 1234968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null check for pipe_ctx-&gt;plane_state in dcn20_program_pipe

This commit addresses a null pointer dereference issue in
dcn20_program_pipe(). Previously, commit 8e4ed3cf1642 ("drm/amd/display:
Add null check for pipe_ctx-&gt;plane_state in dcn20_program_pipe")
partially fixed the null pointer dereference issue. However, in
dcn20_update_dchubp_dpp(), the variable pipe_ctx is passed in, and
plane_state is accessed again through pipe_ctx. Multiple if statements
directly call attributes of plane_state, leading to potential null
pointer dereference issues. This patch adds necessary null checks to
ensure stability.</Note>
    </Notes>
    <CVE>CVE-2024-53201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53201.html</URL>
        <Description>CVE-2024-53201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234969</URL>
        <Description>SUSE Bug 1234969</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Fix possible resource leak in fw_log_firmware_info()

The alg instance should be released under the exception path, otherwise
there may be resource leak here.

To mitigate this, free the alg instance with crypto_free_shash when kmalloc
fails.</Note>
    </Notes>
    <CVE>CVE-2024-53202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53202.html</URL>
        <Description>CVE-2024-53202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234970</URL>
        <Description>SUSE Bug 1234970</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix use-after-free of nreq in reqsk_timer_handler().

The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with
__inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().

Then, oreq should be passed to reqsk_put() instead of req; otherwise
use-after-free of nreq could happen when reqsk is migrated but the
retry attempt failed (e.g. due to timeout).

Let's pass oreq to reqsk_put().</Note>
    </Notes>
    <CVE>CVE-2024-53206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53206.html</URL>
        <Description>CVE-2024-53206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234960</URL>
        <Description>SUSE Bug 1234960</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible deadlocks

This fixes possible deadlocks like the following caused by
hci_cmd_sync_dequeue causing the destroy function to run:

 INFO: task kworker/u19:0:143 blocked for more than 120 seconds.
       Tainted: G        W  O        6.8.0-2024-03-19-intel-next-iLS-24ww14 #1
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:kworker/u19:0   state:D stack:0     pid:143   tgid:143   ppid:2      flags:0x00004000
 Workqueue: hci0 hci_cmd_sync_work [bluetooth]
 Call Trace:
  &lt;TASK&gt;
  __schedule+0x374/0xaf0
  schedule+0x3c/0xf0
  schedule_preempt_disabled+0x1c/0x30
  __mutex_lock.constprop.0+0x3ef/0x7a0
  __mutex_lock_slowpath+0x13/0x20
  mutex_lock+0x3c/0x50
  mgmt_set_connectable_complete+0xa4/0x150 [bluetooth]
  ? kfree+0x211/0x2a0
  hci_cmd_sync_dequeue+0xae/0x130 [bluetooth]
  ? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth]
  cmd_complete_rsp+0x26/0x80 [bluetooth]
  mgmt_pending_foreach+0x4d/0x70 [bluetooth]
  __mgmt_power_off+0x8d/0x180 [bluetooth]
  ? _raw_spin_unlock_irq+0x23/0x40
  hci_dev_close_sync+0x445/0x5b0 [bluetooth]
  hci_set_powered_sync+0x149/0x250 [bluetooth]
  set_powered_sync+0x24/0x60 [bluetooth]
  hci_cmd_sync_work+0x90/0x150 [bluetooth]
  process_one_work+0x13e/0x300
  worker_thread+0x2f7/0x420
  ? __pfx_worker_thread+0x10/0x10
  kthread+0x107/0x140
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x3d/0x60
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1b/0x30
  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-53207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53207.html</URL>
        <Description>CVE-2024-53207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234907</URL>
        <Description>SUSE Bug 1234907</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync

This fixes the following crash:

==================================================================
BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54

CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
q kasan_report+0x143/0x180 mm/kasan/report.c:601
 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd10 kernel/workqueue.c:3389
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;

Allocated by task 5247:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
 kasan_kmalloc include/linux/kasan.h:211 [inline]
 __kmalloc_cache_noprof+0x19c/0x2c0 mm/slub.c:4193
 kmalloc_noprof include/linux/slab.h:681 [inline]
 kzalloc_noprof include/linux/slab.h:807 [inline]
 mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269
 mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296
 set_powered+0x3cd/0x5e0 net/bluetooth/mgmt.c:1394
 hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712
 hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x221/0x270 net/socket.c:745
 sock_write_iter+0x2dd/0x400 net/socket.c:1160
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0xa72/0xc90 fs/read_write.c:590
 ksys_write+0x1a0/0x2c0 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5246:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x149/0x360 mm/slub.c:4598
 settings_rsp+0x2bc/0x390 net/bluetooth/mgmt.c:1443
 mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259
 __mgmt_power_off+0x112/0x420 net/bluetooth/mgmt.c:9455
 hci_dev_close_sync+0x665/0x11a0 net/bluetooth/hci_sync.c:5191
 hci_dev_do_close net/bluetooth/hci_core.c:483 [inline]
 hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508
 sock_do_ioctl+0x158/0x460 net/socket.c:1222
 sock_ioctl+0x629/0x8e0 net/socket.c:1341
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83gv
 entry_SYSCALL_64_after_hwframe+0x77/0x7f</Note>
    </Notes>
    <CVE>CVE-2024-53208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53208.html</URL>
        <Description>CVE-2024-53208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234909</URL>
        <Description>SUSE Bug 1234909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236244</URL>
        <Description>SUSE Bug 1236244</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix receive ring space parameters when XDP is active

The MTU setting at the time an XDP multi-buffer is attached
determines whether the aggregation ring will be used and the
rx_skb_func handler.  This is done in bnxt_set_rx_skb_mode().

If the MTU is later changed, the aggregation ring setting may need
to be changed and it may become out-of-sync with the settings
initially done in bnxt_set_rx_skb_mode().  This may result in
random memory corruption and crashes as the HW may DMA data larger
than the allocated buffer size, such as:

BUG: kernel NULL pointer dereference, address: 00000000000003c0
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 17 PID: 0 Comm: swapper/17 Kdump: loaded Tainted: G S         OE      6.1.0-226bf9805506 #1
Hardware name: Wiwynn Delta Lake PVT BZA.02601.0150/Delta Lake-Class1, BIOS F0E_3A12 08/26/2021
RIP: 0010:bnxt_rx_pkt+0xe97/0x1ae0 [bnxt_en]
Code: 8b 95 70 ff ff ff 4c 8b 9d 48 ff ff ff 66 41 89 87 b4 00 00 00 e9 0b f7 ff ff 0f b7 43 0a 49 8b 95 a8 04 00 00 25 ff 0f 00 00 &lt;0f&gt; b7 14 42 48 c1 e2 06 49 03 95 a0 04 00 00 0f b6 42 33f
RSP: 0018:ffffa19f40cc0d18 EFLAGS: 00010202
RAX: 00000000000001e0 RBX: ffff8e2c805c6100 RCX: 00000000000007ff
RDX: 0000000000000000 RSI: ffff8e2c271ab990 RDI: ffff8e2c84f12380
RBP: ffffa19f40cc0e48 R08: 000000000001000d R09: 974ea2fcddfa4cbf
R10: 0000000000000000 R11: ffffa19f40cc0ff8 R12: ffff8e2c94b58980
R13: ffff8e2c952d6600 R14: 0000000000000016 R15: ffff8e2c271ab990
FS:  0000000000000000(0000) GS:ffff8e3b3f840000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000003c0 CR3: 0000000e8580a004 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 __bnxt_poll_work+0x1c2/0x3e0 [bnxt_en]

To address the issue, we now call bnxt_set_rx_skb_mode() within
bnxt_change_mtu() to properly set the AGG rings configuration and
update rx_skb_func based on the new MTU value.
Additionally, BNXT_FLAG_NO_AGG_RINGS is cleared at the beginning of
bnxt_set_rx_skb_mode() to make sure it gets set or cleared based on
the current MTU.</Note>
    </Notes>
    <CVE>CVE-2024-53209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53209.html</URL>
        <Description>CVE-2024-53209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235002</URL>
        <Description>SUSE Bug 1235002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()

Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount
(skb-&gt;users) and iucv_sock_recvmsg() does not decrement skb refcount
at exit.
This results in skb memory leak in skb_queue_purge() and WARN_ON in
iucv_sock_destruct() during socket close. To fix this decrease
skb refcount by one if MSG_PEEK is set in order to prevent memory
leak and WARN_ON.

WARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv]
CPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G        W          6.10.0-rc7 #1
Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)
Call Trace:
        [&lt;001587c682c4aa98&gt;] iucv_sock_destruct+0x148/0x1a0 [af_iucv]
        [&lt;001587c682c4a9d0&gt;] iucv_sock_destruct+0x80/0x1a0 [af_iucv]
        [&lt;001587c704117a32&gt;] __sk_destruct+0x52/0x550
        [&lt;001587c704104a54&gt;] __sock_release+0xa4/0x230
        [&lt;001587c704104c0c&gt;] sock_close+0x2c/0x40
        [&lt;001587c702c5f5a8&gt;] __fput+0x2e8/0x970
        [&lt;001587c7024148c4&gt;] task_work_run+0x1c4/0x2c0
        [&lt;001587c7023b0716&gt;] do_exit+0x996/0x1050
        [&lt;001587c7023b13aa&gt;] do_group_exit+0x13a/0x360
        [&lt;001587c7023b1626&gt;] __s390x_sys_exit_group+0x56/0x60
        [&lt;001587c7022bccca&gt;] do_syscall+0x27a/0x380
        [&lt;001587c7049a6a0c&gt;] __do_syscall+0x9c/0x160
        [&lt;001587c7049ce8a8&gt;] system_call+0x70/0x98
        Last Breaking-Event-Address:
        [&lt;001587c682c4a9d4&gt;] iucv_sock_destruct+0x84/0x1a0 [af_iucv]</Note>
    </Notes>
    <CVE>CVE-2024-53210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53210.html</URL>
        <Description>CVE-2024-53210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234971</URL>
        <Description>SUSE Bug 1234971</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: usb: lan78xx: Fix double free issue with interrupt buffer allocation

In lan78xx_probe(), the buffer `buf` was being freed twice: once
implicitly through `usb_free_urb(dev-&gt;urb_intr)` with the
`URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused
a double free issue.

To resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to
simplify the initialization sequence and removed the redundant
`kfree(buf)`.  Now, `buf` is allocated after `usb_alloc_urb()`, ensuring
it is correctly managed by  `usb_fill_int_urb()` and freed by
`usb_free_urb()` as intended.</Note>
    </Notes>
    <CVE>CVE-2024-53213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53213.html</URL>
        <Description>CVE-2024-53213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234973</URL>
        <Description>SUSE Bug 1234973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Properly hide first-in-list PCIe extended capability

There are cases where a PCIe extended capability should be hidden from
the user. For example, an unknown capability (i.e., capability with ID
greater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally
chosen to be hidden from the user.

Hiding a capability is done by virtualizing and modifying the 'Next
Capability Offset' field of the previous capability so it points to the
capability after the one that should be hidden.

The special case where the first capability in the list should be hidden
is handled differently because there is no previous capability that can
be modified. In this case, the capability ID and version are zeroed
while leaving the next pointer intact. This hides the capability and
leaves an anchor for the rest of the capability list.

However, today, hiding the first capability in the list is not done
properly if the capability is unknown, as struct
vfio_pci_core_device-&gt;pci_config_map is set to the capability ID during
initialization but the capability ID is not properly checked later when
used in vfio_config_do_rw(). This leads to the following warning [1] and
to an out-of-bounds access to ecap_perms array.

Fix it by checking cap_id in vfio_config_do_rw(), and if it is greater
than PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct
read only access instead of the ecap_perms array.

Note that this is safe since the above is the only case where cap_id can
exceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which
are already checked before).

[1]

WARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
CPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1
(snip)
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x69/0x80
 ? __warn+0x8d/0x140
 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
 ? report_bug+0x18f/0x1a0
 ? handle_bug+0x63/0xa0
 ? exc_invalid_op+0x19/0x70
 ? asm_exc_invalid_op+0x1b/0x20
 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
 ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]
 vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]
 vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]
 vfio_device_fops_read+0x27/0x40 [vfio]
 vfs_read+0xbd/0x340
 ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]
 ? __rseq_handle_notify_resume+0xa4/0x4b0
 __x64_sys_pread64+0x96/0xc0
 x64_sys_call+0x1c3d/0x20d0
 do_syscall_64+0x4d/0x120
 entry_SYSCALL_64_after_hwframe+0x76/0x7e</Note>
    </Notes>
    <CVE>CVE-2024-53214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53214.html</URL>
        <Description>CVE-2024-53214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235004</URL>
        <Description>SUSE Bug 1235004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235005</URL>
        <Description>SUSE Bug 1235005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()

There's issue as follows:
RPC: Registered rdma transport module.
RPC: Registered rdma backchannel transport module.
RPC: Unregistered rdma transport module.
RPC: Unregistered rdma backchannel transport module.
BUG: unable to handle page fault for address: fffffbfff80c609a
PGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
RIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0
Call Trace:
 &lt;TASK&gt;
 __die+0x1f/0x70
 page_fault_oops+0x2cd/0x860
 spurious_kernel_fault+0x36/0x450
 do_kern_addr_fault+0xca/0x100
 exc_page_fault+0x128/0x150
 asm_exc_page_fault+0x26/0x30
 percpu_counter_destroy_many+0xf7/0x2a0
 mmdrop+0x209/0x350
 finish_task_switch.isra.0+0x481/0x840
 schedule_tail+0xe/0xd0
 ret_from_fork+0x23/0x80
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

If register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not
destroy the percpu counters which init in svc_rdma_proc_init().
If CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the
'percpu_counters' list. The above issue may occur once the module is
removed. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory
leakage occurs.
To solve above issue just destroy all percpu counters when
register_sysctl() return NULL.</Note>
    </Notes>
    <CVE>CVE-2024-53215</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53215.html</URL>
        <Description>CVE-2024-53215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234962</URL>
        <Description>SUSE Bug 1234962</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfsd: release svc_expkey/svc_export with rcu_work

The last reference for `cache_head` can be reduced to zero in `c_show`
and `e_show`(using `rcu_read_lock` and `rcu_read_unlock`). Consequently,
`svc_export_put` and `expkey_put` will be invoked, leading to two
issues:

1. The `svc_export_put` will directly free ex_uuid. However,
   `e_show`/`c_show` will access `ex_uuid` after `cache_put`, which can
   trigger a use-after-free issue, shown below.

   ==================================================================
   BUG: KASAN: slab-use-after-free in svc_export_show+0x362/0x430 [nfsd]
   Read of size 1 at addr ff11000010fdc120 by task cat/870

   CPU: 1 UID: 0 PID: 870 Comm: cat Not tainted 6.12.0-rc3+ #1
   Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
   1.16.1-2.fc37 04/01/2014
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x53/0x70
    print_address_description.constprop.0+0x2c/0x3a0
    print_report+0xb9/0x280
    kasan_report+0xae/0xe0
    svc_export_show+0x362/0x430 [nfsd]
    c_show+0x161/0x390 [sunrpc]
    seq_read_iter+0x589/0x770
    seq_read+0x1e5/0x270
    proc_reg_read+0xe1/0x140
    vfs_read+0x125/0x530
    ksys_read+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

   Allocated by task 830:
    kasan_save_stack+0x20/0x40
    kasan_save_track+0x14/0x30
    __kasan_kmalloc+0x8f/0xa0
    __kmalloc_node_track_caller_noprof+0x1bc/0x400
    kmemdup_noprof+0x22/0x50
    svc_export_parse+0x8a9/0xb80 [nfsd]
    cache_do_downcall+0x71/0xa0 [sunrpc]
    cache_write_procfs+0x8e/0xd0 [sunrpc]
    proc_reg_write+0xe1/0x140
    vfs_write+0x1a5/0x6d0
    ksys_write+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

   Freed by task 868:
    kasan_save_stack+0x20/0x40
    kasan_save_track+0x14/0x30
    kasan_save_free_info+0x3b/0x60
    __kasan_slab_free+0x37/0x50
    kfree+0xf3/0x3e0
    svc_export_put+0x87/0xb0 [nfsd]
    cache_purge+0x17f/0x1f0 [sunrpc]
    nfsd_destroy_serv+0x226/0x2d0 [nfsd]
    nfsd_svc+0x125/0x1e0 [nfsd]
    write_threads+0x16a/0x2a0 [nfsd]
    nfsctl_transaction_write+0x74/0xa0 [nfsd]
    vfs_write+0x1a5/0x6d0
    ksys_write+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

2. We cannot sleep while using `rcu_read_lock`/`rcu_read_unlock`.
   However, `svc_export_put`/`expkey_put` will call path_put, which
   subsequently triggers a sleeping operation due to the following
   `dput`.

   =============================
   WARNING: suspicious RCU usage
   5.10.0-dirty #141 Not tainted
   -----------------------------
   ...
   Call Trace:
   dump_stack+0x9a/0xd0
   ___might_sleep+0x231/0x240
   dput+0x39/0x600
   path_put+0x1b/0x30
   svc_export_put+0x17/0x80
   e_show+0x1c9/0x200
   seq_read_iter+0x63f/0x7c0
   seq_read+0x226/0x2d0
   vfs_read+0x113/0x2c0
   ksys_read+0xc9/0x170
   do_syscall_64+0x33/0x40
   entry_SYSCALL_64_after_hwframe+0x67/0xd1

Fix these issues by using `rcu_work` to help release
`svc_expkey`/`svc_export`. This approach allows for an asynchronous
context to invoke `path_put` and also facilitates the freeing of
`uuid/exp/key` after an RCU grace period.</Note>
    </Notes>
    <CVE>CVE-2024-53216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53216.html</URL>
        <Description>CVE-2024-53216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235003</URL>
        <Description>SUSE Bug 1235003</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent NULL dereference in nfsd4_process_cb_update()

@ses is initialized to NULL. If __nfsd4_find_backchannel() finds no
available backchannel session, setup_callback_client() will try to
dereference @ses and segfault.</Note>
    </Notes>
    <CVE>CVE-2024-53217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53217.html</URL>
        <Description>CVE-2024-53217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234999</URL>
        <Description>SUSE Bug 1234999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

zram: fix NULL pointer in comp_algorithm_show()

LTP reported a NULL pointer dereference as followed:

 CPU: 7 UID: 0 PID: 5995 Comm: cat Kdump: loaded Not tainted 6.12.0-rc6+ #3
 Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __pi_strcmp+0x24/0x140
 lr : zcomp_available_show+0x60/0x100 [zram]
 sp : ffff800088b93b90
 x29: ffff800088b93b90 x28: 0000000000000001 x27: 0000000000400cc0
 x26: 0000000000000ffe x25: ffff80007b3e2388 x24: 0000000000000000
 x23: ffff80007b3e2390 x22: ffff0004041a9000 x21: ffff80007b3e2900
 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000
 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
 x11: 0000000000000000 x10: ffff80007b3e2900 x9 : ffff80007b3cb280
 x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000
 x5 : 0000000000000040 x4 : 0000000000000000 x3 : 00656c722d6f7a6c
 x2 : 0000000000000000 x1 : ffff80007b3e2900 x0 : 0000000000000000
 Call trace:
  __pi_strcmp+0x24/0x140
  comp_algorithm_show+0x40/0x70 [zram]
  dev_attr_show+0x28/0x80
  sysfs_kf_seq_show+0x90/0x140
  kernfs_seq_show+0x34/0x48
  seq_read_iter+0x1d4/0x4e8
  kernfs_fop_read_iter+0x40/0x58
  new_sync_read+0x9c/0x168
  vfs_read+0x1a8/0x1f8
  ksys_read+0x74/0x108
  __arm64_sys_read+0x24/0x38
  invoke_syscall+0x50/0x120
  el0_svc_common.constprop.0+0xc8/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x38/0x138
  el0t_64_sync_handler+0xc0/0xc8
  el0t_64_sync+0x188/0x190

The zram-&gt;comp_algs[ZRAM_PRIMARY_COMP] can be NULL in zram_add() if
comp_algorithm_set() has not been called.  User can access the zram device
by sysfs after device_add_disk(), so there is a time window to trigger the
NULL pointer dereference.  Move it ahead device_add_disk() to make sure
when user can access the zram device, it is ready.  comp_algorithm_set()
is protected by zram-&gt;init_lock in other places and no such problem.</Note>
    </Notes>
    <CVE>CVE-2024-53222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53222.html</URL>
        <Description>CVE-2024-53222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234974</URL>
        <Description>SUSE Bug 1234974</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Move events notifier registration to be after device registration

Move pkey change work initialization and cleanup from device resources
stage to notifier stage, since this is the stage which handles this work
events.

Fix a race between the device deregistration and pkey change work by moving
MLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to
ensure that the notifier is deregistered before the device during cleanup.
Which ensures there are no works that are being executed after the
device has already unregistered which can cause the panic below.

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1
Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023
Workqueue: events pkey_change_handler [mlx5_ib]
RIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib]
Code: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 &lt;4c&gt; 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40
RSP: 0018:ffffbcc54068be20 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36
RDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128
RBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001
R10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000
R13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905
FS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
mlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib]
process_one_work+0x1e8/0x3c0
worker_thread+0x50/0x3b0
? rescuer_thread+0x380/0x380
kthread+0x149/0x170
? set_kthread_struct+0x50/0x50
ret_from_fork+0x22/0x30
Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core]
CR2: 0000000000000000
---[ end trace f6f8be4eae12f7bc ]---</Note>
    </Notes>
    <CVE>CVE-2024-53224</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53224.html</URL>
        <Description>CVE-2024-53224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235009</URL>
        <Description>SUSE Bug 1235009</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the qp flush warnings in req

When the qp is in error state, the status of WQEs in the queue should be
set to error. Or else the following will appear.

[  920.617269] WARNING: CPU: 1 PID: 21 at drivers/infiniband/sw/rxe/rxe_comp.c:756 rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.617744] Modules linked in: rnbd_client(O) rtrs_client(O) rtrs_core(O) rdma_ucm rdma_cm iw_cm ib_cm crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel ib_uverbs ib_core loop brd null_blk ipv6
[  920.618516] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G           O       6.1.113-storage+ #65
[  920.618986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
[  920.619396] RIP: 0010:rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.619658] Code: 0f b6 84 24 3a 02 00 00 41 89 84 24 44 04 00 00 e9 2a f7 ff ff 39 ca bb 03 00 00 00 b8 0e 00 00 00 48 0f 45 d8 e9 15 f7 ff ff &lt;0f&gt; 0b e9 cb f8 ff ff 41 bf f5 ff ff ff e9 08 f8 ff ff 49 8d bc 24
[  920.620482] RSP: 0018:ffff97b7c00bbc38 EFLAGS: 00010246
[  920.620817] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000008
[  920.621183] RDX: ffff960dc396ebc0 RSI: 0000000000005400 RDI: ffff960dc4e2fbac
[  920.621548] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffac406450
[  920.621884] R10: ffffffffac4060c0 R11: 0000000000000001 R12: ffff960dc4e2f800
[  920.622254] R13: ffff960dc4e2f928 R14: ffff97b7c029c580 R15: 0000000000000000
[  920.622609] FS:  0000000000000000(0000) GS:ffff960ef7d00000(0000) knlGS:0000000000000000
[  920.622979] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  920.623245] CR2: 00007fa056965e90 CR3: 00000001107f1000 CR4: 00000000000006e0
[  920.623680] Call Trace:
[  920.623815]  &lt;TASK&gt;
[  920.623933]  ? __warn+0x79/0xc0
[  920.624116]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.624356]  ? report_bug+0xfb/0x150
[  920.624594]  ? handle_bug+0x3c/0x60
[  920.624796]  ? exc_invalid_op+0x14/0x70
[  920.624976]  ? asm_exc_invalid_op+0x16/0x20
[  920.625203]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.625474]  ? rxe_completer+0x329/0xcc0 [rdma_rxe]
[  920.625749]  rxe_do_task+0x80/0x110 [rdma_rxe]
[  920.626037]  rxe_requester+0x625/0xde0 [rdma_rxe]
[  920.626310]  ? rxe_cq_post+0xe2/0x180 [rdma_rxe]
[  920.626583]  ? do_complete+0x18d/0x220 [rdma_rxe]
[  920.626812]  ? rxe_completer+0x1a3/0xcc0 [rdma_rxe]
[  920.627050]  rxe_do_task+0x80/0x110 [rdma_rxe]
[  920.627285]  tasklet_action_common.constprop.0+0xa4/0x120
[  920.627522]  handle_softirqs+0xc2/0x250
[  920.627728]  ? sort_range+0x20/0x20
[  920.627942]  run_ksoftirqd+0x1f/0x30
[  920.628158]  smpboot_thread_fn+0xc7/0x1b0
[  920.628334]  kthread+0xd6/0x100
[  920.628504]  ? kthread_complete_and_exit+0x20/0x20
[  920.628709]  ret_from_fork+0x1f/0x30
[  920.628892]  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-53229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53229.html</URL>
        <Description>CVE-2024-53229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234905</URL>
        <Description>SUSE Bug 1234905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

erofs: handle NONHEAD !delta[1] lclusters gracefully

syzbot reported a WARNING in iomap_iter_done:
 iomap_fiemap+0x73b/0x9b0 fs/iomap/fiemap.c:80
 ioctl_fiemap fs/ioctl.c:220 [inline]

Generally, NONHEAD lclusters won't have delta[1]==0, except for crafted
images and filesystems created by pre-1.0 mkfs versions.

Previously, it would immediately bail out if delta[1]==0, which led to
inadequate decompressed lengths (thus FIEMAP is impacted).  Treat it as
delta[1]=1 to work around these legacy mkfs versions.

`lclusterbits &gt; 14` is illegal for compact indexes, error out too.</Note>
    </Notes>
    <CVE>CVE-2024-53234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53234.html</URL>
        <Description>CVE-2024-53234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235045</URL>
        <Description>SUSE Bug 1235045</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: fix use-after-free in device_for_each_child()

Syzbot has reported the following KASAN splat:

BUG: KASAN: slab-use-after-free in device_for_each_child+0x18f/0x1a0
Read of size 8 at addr ffff88801f605308 by task kbnepd bnep0/4980

CPU: 0 UID: 0 PID: 4980 Comm: kbnepd bnep0 Not tainted 6.12.0-rc4-00161-gae90f6a6170d #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x100/0x190
 ? device_for_each_child+0x18f/0x1a0
 print_report+0x13a/0x4cb
 ? __virt_addr_valid+0x5e/0x590
 ? __phys_addr+0xc6/0x150
 ? device_for_each_child+0x18f/0x1a0
 kasan_report+0xda/0x110
 ? device_for_each_child+0x18f/0x1a0
 ? __pfx_dev_memalloc_noio+0x10/0x10
 device_for_each_child+0x18f/0x1a0
 ? __pfx_device_for_each_child+0x10/0x10
 pm_runtime_set_memalloc_noio+0xf2/0x180
 netdev_unregister_kobject+0x1ed/0x270
 unregister_netdevice_many_notify+0x123c/0x1d80
 ? __mutex_trylock_common+0xde/0x250
 ? __pfx_unregister_netdevice_many_notify+0x10/0x10
 ? trace_contention_end+0xe6/0x140
 ? __mutex_lock+0x4e7/0x8f0
 ? __pfx_lock_acquire.part.0+0x10/0x10
 ? rcu_is_watching+0x12/0xc0
 ? unregister_netdev+0x12/0x30
 unregister_netdevice_queue+0x30d/0x3f0
 ? __pfx_unregister_netdevice_queue+0x10/0x10
 ? __pfx_down_write+0x10/0x10
 unregister_netdev+0x1c/0x30
 bnep_session+0x1fb3/0x2ab0
 ? __pfx_bnep_session+0x10/0x10
 ? __pfx_lock_release+0x10/0x10
 ? __pfx_woken_wake_function+0x10/0x10
 ? __kthread_parkme+0x132/0x200
 ? __pfx_bnep_session+0x10/0x10
 ? kthread+0x13a/0x370
 ? __pfx_bnep_session+0x10/0x10
 kthread+0x2b7/0x370
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x48/0x80
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 4974:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0xaa/0xb0
 __kmalloc_noprof+0x1d1/0x440
 hci_alloc_dev_priv+0x1d/0x2820
 __vhci_create_device+0xef/0x7d0
 vhci_write+0x2c7/0x480
 vfs_write+0x6a0/0xfc0
 ksys_write+0x12f/0x260
 do_syscall_64+0xc7/0x250
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 4979:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x4f/0x70
 kfree+0x141/0x490
 hci_release_dev+0x4d9/0x600
 bt_host_release+0x6a/0xb0
 device_release+0xa4/0x240
 kobject_put+0x1ec/0x5a0
 put_device+0x1f/0x30
 vhci_release+0x81/0xf0
 __fput+0x3f6/0xb30
 task_work_run+0x151/0x250
 do_exit+0xa79/0x2c30
 do_group_exit+0xd5/0x2a0
 get_signal+0x1fcd/0x2210
 arch_do_signal_or_restart+0x93/0x780
 syscall_exit_to_user_mode+0x140/0x290
 do_syscall_64+0xd4/0x250
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

In 'hci_conn_del_sysfs()', 'device_unregister()' may be called when
an underlying (kobject) reference counter is greater than 1. This
means that reparenting (happened when the device is actually freed)
is delayed and, during that delay, parent controller device (hciX)
may be deleted. Since the latter may create a dangling pointer to
freed parent, avoid that scenario by reparenting to NULL explicitly.</Note>
    </Notes>
    <CVE>CVE-2024-53237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53237.html</URL>
        <Description>CVE-2024-53237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235007</URL>
        <Description>SUSE Bug 1235007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235008</URL>
        <Description>SUSE Bug 1235008</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xen/netfront: fix crash when removing device

When removing a netfront device directly after a suspend/resume cycle
it might happen that the queues have not been setup again, causing a
crash during the attempt to stop the queues another time.

Fix that by checking the queues are existing before trying to stop
them.

This is XSA-465 / CVE-2024-53240.</Note>
    </Notes>
    <CVE>CVE-2024-53240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53240.html</URL>
        <Description>CVE-2024-53240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234281</URL>
        <Description>SUSE Bug 1234281</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/xen: don't do PV iret hypercall through hypercall page

Instead of jumping to the Xen hypercall page for doing the iret
hypercall, directly code the required sequence in xen-asm.S.

This is done in preparation of no longer using hypercall page at all,
as it has shown to cause problems with speculation mitigations.

This is part of XSA-466 / CVE-2024-53241.</Note>
    </Notes>
    <CVE>CVE-2024-53241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53241.html</URL>
        <Description>CVE-2024-53241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234282</URL>
        <Description>SUSE Bug 1234282</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: cw1200: Fix potential NULL dereference

A recent refactoring was identified by static analysis to
cause a potential NULL dereference, fix this!</Note>
    </Notes>
    <CVE>CVE-2024-56536</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56536.html</URL>
        <Description>CVE-2024-56536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234911</URL>
        <Description>SUSE Bug 1234911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()

Replace one-element array with a flexible-array member in `struct
mwifiex_ie_types_wildcard_ssid_params` to fix the following warning
on a MT8173 Chromebook (mt8173-elm-hana):

[  356.775250] ------------[ cut here ]------------
[  356.784543] memcpy: detected field-spanning write (size 6) of single field "wildcard_ssid_tlv-&gt;ssid" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)
[  356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]

The "(size 6)" above is exactly the length of the SSID of the network
this device was connected to. The source of the warning looks like:

    ssid_len = user_scan_in-&gt;ssid_list[i].ssid_len;
    [...]
    memcpy(wildcard_ssid_tlv-&gt;ssid,
           user_scan_in-&gt;ssid_list[i].ssid, ssid_len);

There is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this
struct, but it already didn't account for the size of the one-element
array, so it doesn't need to be changed.</Note>
    </Notes>
    <CVE>CVE-2024-56539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56539.html</URL>
        <Description>CVE-2024-56539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234963</URL>
        <Description>SUSE Bug 1234963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234964</URL>
        <Description>SUSE Bug 1234964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cachefiles: Fix NULL pointer dereference in object-&gt;file

At present, the object-&gt;file has the NULL pointer dereference problem in
ondemand-mode. The root cause is that the allocated fd and object-&gt;file
lifetime are inconsistent, and the user-space invocation to anon_fd uses
object-&gt;file. Following is the process that triggers the issue:

	  [write fd]				[umount]
cachefiles_ondemand_fd_write_iter
				       fscache_cookie_state_machine
					 cachefiles_withdraw_cookie
  if (!file) return -ENOBUFS
					   cachefiles_clean_up_object
					     cachefiles_unmark_inode_in_use
					     fput(object-&gt;file)
					     object-&gt;file = NULL
  // file NULL pointer dereference!
  __cachefiles_write(..., file, ...)

Fix this issue by add an additional reference count to the object-&gt;file
before write/llseek, and decrement after it finished.</Note>
    </Notes>
    <CVE>CVE-2024-56549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56549.html</URL>
        <Description>CVE-2024-56549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234912</URL>
        <Description>SUSE Bug 1234912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix usage slab after free

[  +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147

[  +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1
[  +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.000016] Call Trace:
[  +0.000008]  &lt;TASK&gt;
[  +0.000009]  dump_stack_lvl+0x76/0xa0
[  +0.000017]  print_report+0xce/0x5f0
[  +0.000017]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  ? srso_return_thunk+0x5/0x5f
[  +0.000015]  ? kasan_complete_mode_report_info+0x72/0x200
[  +0.000016]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  kasan_report+0xbe/0x110
[  +0.000015]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000023]  __asan_report_load8_noabort+0x14/0x30
[  +0.000014]  drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000016]  ? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? enable_work+0x124/0x220
[  +0.000015]  ? __pfx_enable_work+0x10/0x10
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? free_large_kmalloc+0x85/0xf0
[  +0.000016]  drm_sched_entity_destroy+0x18/0x30 [gpu_sched]
[  +0.000020]  amdgpu_vce_sw_fini+0x55/0x170 [amdgpu]
[  +0.000735]  ? __kasan_check_read+0x11/0x20
[  +0.000016]  vce_v4_0_sw_fini+0x80/0x110 [amdgpu]
[  +0.000726]  amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu]
[  +0.000679]  ? mutex_unlock+0x80/0xe0
[  +0.000017]  ? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu]
[  +0.000662]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? mutex_unlock+0x80/0xe0
[  +0.000016]  amdgpu_driver_release_kms+0x16/0x80 [amdgpu]
[  +0.000663]  drm_minor_release+0xc9/0x140 [drm]
[  +0.000081]  drm_release+0x1fd/0x390 [drm]
[  +0.000082]  __fput+0x36c/0xad0
[  +0.000018]  __fput_sync+0x3c/0x50
[  +0.000014]  __x64_sys_close+0x7d/0xe0
[  +0.000014]  x64_sys_call+0x1bc6/0x2680
[  +0.000014]  do_syscall_64+0x70/0x130
[  +0.000014]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit_to_user_mode+0x60/0x190
[  +0.000015]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit+0x43/0x50
[  +0.000012]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? exc_page_fault+0x7c/0x110
[  +0.000015]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  +0.000014] RIP: 0033:0x7ffff7b14f67
[  +0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff
[  +0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  +0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67
[  +0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003
[  +0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000
[  +0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8
[  +0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040
[  +0.000020]  &lt;/TASK&gt;

[  +0.000016] Allocated by task 383 on cpu 7 at 26.880319s:
[  +0.000014]  kasan_save_stack+0x28/0x60
[  +0.000008]  kasan_save_track+0x18/0x70
[  +0.000007]  kasan_save_alloc_info+0x38/0x60
[  +0.000007]  __kasan_kmalloc+0xc1/0xd0
[  +0.000007]  kmalloc_trace_noprof+0x180/0x380
[  +0.000007]  drm_sched_init+0x411/0xec0 [gpu_sched]
[  +0.000012]  amdgpu_device_init+0x695f/0xa610 [amdgpu]
[  +0.000658]  amdgpu_driver_load_kms+0x1a/0x120 [amdgpu]
[  +0.000662]  amdgpu_pci_p
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-56551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56551.html</URL>
        <Description>CVE-2024-56551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235075</URL>
        <Description>SUSE Bug 1235075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235102</URL>
        <Description>SUSE Bug 1235102</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()

if (dev-&gt;boardinfo &amp;&amp; dev-&gt;boardinfo-&gt;init_dyn_addr)
                                      ^^^ here check "init_dyn_addr"
	i3c_bus_set_addr_slot_status(&amp;master-&gt;bus, dev-&gt;info.dyn_addr, ...)
						             ^^^^
							free "dyn_addr"
Fix copy/paste error "dyn_addr" by replacing it with "init_dyn_addr".</Note>
    </Notes>
    <CVE>CVE-2024-56562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56562.html</URL>
        <Description>CVE-2024-56562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234930</URL>
        <Description>SUSE Bug 1234930</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/slub: Avoid list corruption when removing a slab from the full list

Boot with slub_debug=UFPZ.

If allocated object failed in alloc_consistency_checks, all objects of
the slab will be marked as used, and then the slab will be removed from
the partial list.

When an object belonging to the slab got freed later, the remove_full()
function is called. Because the slab is neither on the partial list nor
on the full list, it eventually lead to a list corruption (actually a
list poison being detected).

So we need to mark and isolate the slab page with metadata corruption,
do not put it back in circulation.

Because the debug caches avoid all the fastpaths, reusing the frozen bit
to mark slab page with metadata corruption seems to be fine.

[ 4277.385669] list_del corruption, ffffea00044b3e50-&gt;next is LIST_POISON1 (dead000000000100)
[ 4277.387023] ------------[ cut here ]------------
[ 4277.387880] kernel BUG at lib/list_debug.c:56!
[ 4277.388680] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[ 4277.389562] CPU: 5 PID: 90 Comm: kworker/5:1 Kdump: loaded Tainted: G           OE      6.6.1-1 #1
[ 4277.392113] Workqueue: xfs-inodegc/vda1 xfs_inodegc_worker [xfs]
[ 4277.393551] RIP: 0010:__list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.394518] Code: 48 91 82 e8 37 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 28 49 91 82 e8 26 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 58 49 91
[ 4277.397292] RSP: 0018:ffffc90000333b38 EFLAGS: 00010082
[ 4277.398202] RAX: 000000000000004e RBX: ffffea00044b3e50 RCX: 0000000000000000
[ 4277.399340] RDX: 0000000000000002 RSI: ffffffff828f8715 RDI: 00000000ffffffff
[ 4277.400545] RBP: ffffea00044b3e40 R08: 0000000000000000 R09: ffffc900003339f0
[ 4277.401710] R10: 0000000000000003 R11: ffffffff82d44088 R12: ffff888112cf9910
[ 4277.402887] R13: 0000000000000001 R14: 0000000000000001 R15: ffff8881000424c0
[ 4277.404049] FS:  0000000000000000(0000) GS:ffff88842fd40000(0000) knlGS:0000000000000000
[ 4277.405357] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4277.406389] CR2: 00007f2ad0b24000 CR3: 0000000102a3a006 CR4: 00000000007706e0
[ 4277.407589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4277.408780] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4277.410000] PKRU: 55555554
[ 4277.410645] Call Trace:
[ 4277.411234]  &lt;TASK&gt;
[ 4277.411777]  ? die+0x32/0x80
[ 4277.412439]  ? do_trap+0xd6/0x100
[ 4277.413150]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.414158]  ? do_error_trap+0x6a/0x90
[ 4277.414948]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.415915]  ? exc_invalid_op+0x4c/0x60
[ 4277.416710]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.417675]  ? asm_exc_invalid_op+0x16/0x20
[ 4277.418482]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.419466]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.420410]  free_to_partial_list+0x515/0x5e0
[ 4277.421242]  ? xfs_iext_remove+0x41a/0xa10 [xfs]
[ 4277.422298]  xfs_iext_remove+0x41a/0xa10 [xfs]
[ 4277.423316]  ? xfs_inodegc_worker+0xb4/0x1a0 [xfs]
[ 4277.424383]  xfs_bmap_del_extent_delay+0x4fe/0x7d0 [xfs]
[ 4277.425490]  __xfs_bunmapi+0x50d/0x840 [xfs]
[ 4277.426445]  xfs_itruncate_extents_flags+0x13a/0x490 [xfs]
[ 4277.427553]  xfs_inactive_truncate+0xa3/0x120 [xfs]
[ 4277.428567]  xfs_inactive+0x22d/0x290 [xfs]
[ 4277.429500]  xfs_inodegc_worker+0xb4/0x1a0 [xfs]
[ 4277.430479]  process_one_work+0x171/0x340
[ 4277.431227]  worker_thread+0x277/0x390
[ 4277.431962]  ? __pfx_worker_thread+0x10/0x10
[ 4277.432752]  kthread+0xf0/0x120
[ 4277.433382]  ? __pfx_kthread+0x10/0x10
[ 4277.434134]  ret_from_fork+0x2d/0x50
[ 4277.434837]  ? __pfx_kthread+0x10/0x10
[ 4277.435566]  ret_from_fork_asm+0x1b/0x30
[ 4277.436280]  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-56566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56566.html</URL>
        <Description>CVE-2024-56566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235033</URL>
        <Description>SUSE Bug 1235033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235034</URL>
        <Description>SUSE Bug 1235034</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ad7780: fix division by zero in ad7780_write_raw()

In the ad7780_write_raw() , val2 can be zero, which might lead to a
division by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw()
is based on iio_info's write_raw. While val is explicitly declared that
can be zero (in read mode), val2 is not specified to be non-zero.</Note>
    </Notes>
    <CVE>CVE-2024-56567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56567.html</URL>
        <Description>CVE-2024-56567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234916</URL>
        <Description>SUSE Bug 1234916</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: i2c: tc358743: Fix crash in the probe error path when using polling

If an error occurs in the probe() function, we should remove the polling
timer that was alarmed earlier, otherwise the timer is called with
arguments that are already freed, which results in a crash.

------------[ cut here ]------------
WARNING: CPU: 3 PID: 0 at kernel/time/timer.c:1830 __run_timers+0x244/0x268
Modules linked in:
CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.11.0 #226
Hardware name: Diasom DS-RK3568-SOM-EVB (DT)
pstate: 804000c9 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __run_timers+0x244/0x268
lr : __run_timers+0x1d4/0x268
sp : ffffff80eff2baf0
x29: ffffff80eff2bb50 x28: 7fffffffffffffff x27: ffffff80eff2bb00
x26: ffffffc080f669c0 x25: ffffff80efef6bf0 x24: ffffff80eff2bb00
x23: 0000000000000000 x22: dead000000000122 x21: 0000000000000000
x20: ffffff80efef6b80 x19: ffffff80041c8bf8 x18: ffffffffffffffff
x17: ffffffc06f146000 x16: ffffff80eff27dc0 x15: 000000000000003e
x14: 0000000000000000 x13: 00000000000054da x12: 0000000000000000
x11: 00000000000639c0 x10: 000000000000000c x9 : 0000000000000009
x8 : ffffff80eff2cb40 x7 : ffffff80eff2cb40 x6 : ffffff8002bee480
x5 : ffffffc080cb2220 x4 : ffffffc080cb2150 x3 : 00000000000f4240
x2 : 0000000000000102 x1 : ffffff80eff2bb00 x0 : ffffff80041c8bf0
Call trace:
  __run_timers+0x244/0x268
  timer_expire_remote+0x50/0x68
  tmigr_handle_remote+0x388/0x39c
  run_timer_softirq+0x38/0x44
  handle_softirqs+0x138/0x298
  __do_softirq+0x14/0x20
  ____do_softirq+0x10/0x1c
  call_on_irq_stack+0x24/0x4c
  do_softirq_own_stack+0x1c/0x2c
  irq_exit_rcu+0x9c/0xcc
  el1_interrupt+0x48/0xc0
  el1h_64_irq_handler+0x18/0x24
  el1h_64_irq+0x7c/0x80
  default_idle_call+0x34/0x68
  do_idle+0x23c/0x294
  cpu_startup_entry+0x38/0x3c
  secondary_start_kernel+0x128/0x160
  __secondary_switched+0xb8/0xbc
---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2024-56576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56576.html</URL>
        <Description>CVE-2024-56576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235019</URL>
        <Description>SUSE Bug 1235019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free in btrfs_encoded_read_endio()

Shinichiro reported the following use-after free that sometimes is
happening in our CI system when running fstests' btrfs/284 on a TCMU
runner device:

  BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780
  Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219

  CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15
  Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020
  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6e/0xa0
   ? lock_release+0x708/0x780
   print_report+0x174/0x505
   ? lock_release+0x708/0x780
   ? __virt_addr_valid+0x224/0x410
   ? lock_release+0x708/0x780
   kasan_report+0xda/0x1b0
   ? lock_release+0x708/0x780
   ? __wake_up+0x44/0x60
   lock_release+0x708/0x780
   ? __pfx_lock_release+0x10/0x10
   ? __pfx_do_raw_spin_lock+0x10/0x10
   ? lock_is_held_type+0x9a/0x110
   _raw_spin_unlock_irqrestore+0x1f/0x60
   __wake_up+0x44/0x60
   btrfs_encoded_read_endio+0x14b/0x190 [btrfs]
   btrfs_check_read_bio+0x8d9/0x1360 [btrfs]
   ? lock_release+0x1b0/0x780
   ? trace_lock_acquire+0x12f/0x1a0
   ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs]
   ? process_one_work+0x7e3/0x1460
   ? lock_acquire+0x31/0xc0
   ? process_one_work+0x7e3/0x1460
   process_one_work+0x85c/0x1460
   ? __pfx_process_one_work+0x10/0x10
   ? assign_work+0x16c/0x240
   worker_thread+0x5e6/0xfc0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x2c3/0x3a0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x31/0x70
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 3661:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   __kasan_kmalloc+0xaa/0xb0
   btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs]
   send_extent_data+0xf0f/0x24a0 [btrfs]
   process_extent+0x48a/0x1830 [btrfs]
   changed_cb+0x178b/0x2ea0 [btrfs]
   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]
   _btrfs_ioctl_send+0x117/0x330 [btrfs]
   btrfs_ioctl+0x184a/0x60a0 [btrfs]
   __x64_sys_ioctl+0x12e/0x1a0
   do_syscall_64+0x95/0x180
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

  Freed by task 3661:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   kasan_save_free_info+0x3b/0x70
   __kasan_slab_free+0x4f/0x70
   kfree+0x143/0x490
   btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs]
   send_extent_data+0xf0f/0x24a0 [btrfs]
   process_extent+0x48a/0x1830 [btrfs]
   changed_cb+0x178b/0x2ea0 [btrfs]
   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]
   _btrfs_ioctl_send+0x117/0x330 [btrfs]
   btrfs_ioctl+0x184a/0x60a0 [btrfs]
   __x64_sys_ioctl+0x12e/0x1a0
   do_syscall_64+0x95/0x180
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

  The buggy address belongs to the object at ffff888106a83f00
   which belongs to the cache kmalloc-rnd-07-96 of size 96
  The buggy address is located 24 bytes inside of
   freed 96-byte region [ffff888106a83f00, ffff888106a83f60)

  The buggy address belongs to the physical page:
  page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83
  flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)
  page_type: f5(slab)
  raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004
  raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
   ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
  &gt;ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
                              ^
   ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
   ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ==================================================================

Further analyzing the trace and 
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-56582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56582.html</URL>
        <Description>CVE-2024-56582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235128</URL>
        <Description>SUSE Bug 1235128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235129</URL>
        <Description>SUSE Bug 1235129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: avoid NULL pointer error during sdio remove

When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio
workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON
is set to yes, kernel panic will happen:
Call trace:
 destroy_workqueue+0x1c/0x258
 ath10k_sdio_remove+0x84/0x94
 sdio_bus_remove+0x50/0x16c
 device_release_driver_internal+0x188/0x25c
 device_driver_detach+0x20/0x2c

This is because during 'rmmod ath10k', ath10k_sdio_remove() will call
ath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()
will finally be called in ath10k_core_destroy(). This function will free
struct cfg80211_registered_device *rdev and all its members, including
wiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio
workqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.

After device release, destroy_workqueue() will use NULL pointer then the
kernel panic happen.

Call trace:
ath10k_sdio_remove
  -&gt;ath10k_core_unregister
    ……
    -&gt;ath10k_core_stop
      -&gt;ath10k_hif_stop
        -&gt;ath10k_sdio_irq_disable
    -&gt;ath10k_hif_power_down
      -&gt;del_timer_sync(&amp;ar_sdio-&gt;sleep_timer)
  -&gt;ath10k_core_destroy
    -&gt;ath10k_mac_destroy
      -&gt;ieee80211_free_hw
        -&gt;wiphy_free
    ……
          -&gt;wiphy_dev_release
  -&gt;destroy_workqueue

Need to call destroy_workqueue() before ath10k_core_destroy(), free
the work queue buffer first and then free pointer of work queue by
ath10k_core_destroy(). This order matches the error path order in
ath10k_sdio_probe().

No work will be queued on sdio workqueue between it is destroyed and
ath10k_core_destroy() is called. Based on the call_stack above, the
reason is:
Only ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and
ath10k_sdio_irq_disable() will queue work on sdio workqueue.
Sleep timer will be deleted before ath10k_core_destroy() in
ath10k_hif_power_down().
ath10k_sdio_irq_disable() only be called in ath10k_hif_stop().
ath10k_core_unregister() will call ath10k_hif_power_down() to stop hif
bus, so ath10k_sdio_hif_tx_sg() won't be called anymore.

Tested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189</Note>
    </Notes>
    <CVE>CVE-2024-56599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56599.html</URL>
        <Description>CVE-2024-56599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235138</URL>
        <Description>SUSE Bug 1235138</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()

bt_sock_alloc() attaches allocated sk object to the provided sock object.
If rfcomm_dlc_alloc() fails, we release the sk object, but leave the
dangling pointer in the sock object, which may cause use-after-free.

Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().</Note>
    </Notes>
    <CVE>CVE-2024-56604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56604.html</URL>
        <Description>CVE-2024-56604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235056</URL>
        <Description>SUSE Bug 1235056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235058</URL>
        <Description>SUSE Bug 1235058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()

bt_sock_alloc() allocates the sk object and attaches it to the provided
sock object. On error l2cap_sock_alloc() frees the sk object, but the
dangling pointer is still attached to the sock object, which may create
use-after-free in other code.</Note>
    </Notes>
    <CVE>CVE-2024-56605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56605.html</URL>
        <Description>CVE-2024-56605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235061</URL>
        <Description>SUSE Bug 1235061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235062</URL>
        <Description>SUSE Bug 1235062</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_session_new(): fix skb reference counting

Since j1939_session_skb_queue() does an extra skb_get() for each new
skb, do the same for the initial one in j1939_session_new() to avoid
refcount underflow.

[mkl: clean up commit message]</Note>
    </Notes>
    <CVE>CVE-2024-56645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56645.html</URL>
        <Description>CVE-2024-56645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235134</URL>
        <Description>SUSE Bug 1235134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235135</URL>
        <Description>SUSE Bug 1235135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix NULL pointer dereference in capture_engine

When the intel_context structure contains NULL,
it raises a NULL pointer dereference error in drm_info().

(cherry picked from commit 754302a5bc1bd8fd3b7d85c168b0a1af6d4bba4d)</Note>
    </Notes>
    <CVE>CVE-2024-56667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56667.html</URL>
        <Description>CVE-2024-56667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235016</URL>
        <Description>SUSE Bug 1235016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-56752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56752.html</URL>
        <Description>CVE-2024-56752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234937</URL>
        <Description>SUSE Bug 1234937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: caam - Fix the pointer passed to caam_qi_shutdown()

The type of the last parameter given to devm_add_action_or_reset() is
"struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to
"struct device *".

Pass the correct parameter to devm_add_action_or_reset() so that the
resources are released as expected.</Note>
    </Notes>
    <CVE>CVE-2024-56754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56754.html</URL>
        <Description>CVE-2024-56754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234918</URL>
        <Description>SUSE Bug 1234918</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING

In fscache_create_volume(), there is a missing memory barrier between the
bit-clearing operation and the wake-up operation. This may cause a
situation where, after a wake-up, the bit-clearing operation hasn't been
detected yet, leading to an indefinite wait. The triggering process is as
follows:

  [cookie1]                [cookie2]                  [volume_work]
fscache_perform_lookup
  fscache_create_volume
                        fscache_perform_lookup
                          fscache_create_volume
			                        fscache_create_volume_work
                                                  cachefiles_acquire_volume
                                                  clear_and_wake_up_bit
    test_and_set_bit
                            test_and_set_bit
                              goto maybe_wait
      goto no_wait

In the above process, cookie1 and cookie2 has the same volume. When cookie1
enters the -no_wait- process, it will clear the bit and wake up the waiting
process. If a barrier is missing, it may cause cookie2 to remain in the
-wait- process indefinitely.

In commit 3288666c7256 ("fscache: Use clear_and_wake_up_bit() in
fscache_create_volume_work()"), barriers were added to similar operations
in fscache_create_volume_work(), but fscache_create_volume() was missed.

By combining the clear and wake operations into clear_and_wake_up_bit() to
fix this issue.</Note>
    </Notes>
    <CVE>CVE-2024-56755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56755.html</URL>
        <Description>CVE-2024-56755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234920</URL>
        <Description>SUSE Bug 1234920</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix freeing of the HMB descriptor table

The HMB descriptor table is sized to the maximum number of descriptors
that could be used for a given device, but __nvme_alloc_host_mem could
break out of the loop earlier on memory allocation failure and end up
using less descriptors than planned for, which leads to an incorrect
size passed to dma_free_coherent.

In practice this was not showing up because the number of descriptors
tends to be low and the dma coherent allocator always allocates and
frees at least a page.</Note>
    </Notes>
    <CVE>CVE-2024-56756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56756.html</URL>
        <Description>CVE-2024-56756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234922</URL>
        <Description>SUSE Bug 1234922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.</Note>
    </Notes>
    <CVE>CVE-2024-8805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP6-Azure-Basic:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-Azure-Standard:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC-Azure:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>Image SLES15-SP6-HPC:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.23.1</ProductID>
        <ProductID>openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-8805.html</URL>
        <Description>CVE-2024-8805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230697</URL>
        <Description>SUSE Bug 1230697</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
