<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0236-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-01-24T17:02:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-01-24T17:02:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-01-24T17:02:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() (bsc#1226694).
- CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() (bsc#1232045).
- CVE-2022-49035: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (bsc#1215304).
- CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts()  (bsc#1220148).
- CVE-2023-52922: can: bcm: Fix UAF in bcm_proc_show() (bsc#1233977).
- CVE-2024-26976: KVM: Always flush async #PF workqueue when vCPU is being destroyed (bsc#1223635).
- CVE-2024-35847: irqchip/gic-v3-its: Prevent double free on error (bsc#1224697).
- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-47141: pinmux: Use sequential access to access desc-&gt;pinmux data (bsc#1235708).
- CVE-2024-47666: scsi: pm80xx: Set phy-&gt;enable_completion only when we wait for it (bsc#1231453).
- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
- CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166).
- CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
- CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).
- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).
- CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050).
- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).
- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).
- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).
- CVE-2024-50287: media: v4l2-tpg: prevent the risk of a division by zero (bsc#1233476).
- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53101: fs: Fix uninitialized value issue in from_kuid and from_kgid (bsc#1233769).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
- CVE-2024-53150: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (bsc#1234834).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).
- CVE-2024-53157: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (bsc#1234827).
- CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923).
- CVE-2024-53210: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (bsc#1234971).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53224: RDMA/mlx5: Cancel pkey work before destroying device resources (bsc#1235009).
- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-56531: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (bsc#1235057).
- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).
- CVE-2024-56551: drm/amdgpu: fix usage slab after free (bsc#1235075).
- CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031).
- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).
- CVE-2024-56587: leds: class: Protect brightness_show() with led_cdev-&gt;led_access mutex (bsc#1235125).
- CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138).
- CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56616: drm/dp_mst: Fix MST sideband message body length check (bsc#1235427).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56724: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (bsc#1235577).
- CVE-2024-56756: nvme-pci: fix freeing of the HMB descriptor table (bsc#1234922).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57887: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (bsc#1235952).
- CVE-2024-57888: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416 bsc#1235918).
- CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
    
The following non-security bugs were fixed:

- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- cifs: fix calc signature on big endian systems (bsc#1235888, bsc#1234921).
- memcg: reduce memcg tree traversals for stats collection (bsc#1231877).
- mm: memory.stat allow preemption (bsc#1231877).
- net: marvell: mvpp2: phylink requires the link interrupt (bsc#1117016).
- smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- udf: Handle error when adding extent to a file (bsc#1234437).
- udf: refactor udf_current_aext() to handle error (bsc#1234240).
- udf: refactor udf_next_aext() to handle error (bsc#1234241).
- workqueue: skip lockdep wq dependency in cancel_work_sync() (bsc#1235918).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-EC2-BYOS-2025-236,Image SLES12-SP5-EC2-ECS-On-Demand-2025-236,Image SLES12-SP5-EC2-On-Demand-2025-236,Image SLES12-SP5-EC2-SAP-BYOS-2025-236,Image SLES12-SP5-EC2-SAP-On-Demand-2025-236,Image SLES12-SP5-SAP-Azure-LI-BYOS-Production-2025-236,Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production-2025-236,SUSE-2025-236,SUSE-SLE-HA-12-SP5-2025-236,SUSE-SLE-Live-Patching-12-SP5-2025-236,SUSE-SLE-SERVER-12-SP5-LTSS-2025-236,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-236</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      <Description>Link for SUSE-SU-2025:0236-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0236-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1117016</URL>
      <Description>SUSE Bug 1117016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168202</URL>
      <Description>SUSE Bug 1168202</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1188924</URL>
      <Description>SUSE Bug 1188924</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215304</URL>
      <Description>SUSE Bug 1215304</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220148</URL>
      <Description>SUSE Bug 1220148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223635</URL>
      <Description>SUSE Bug 1223635</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224697</URL>
      <Description>SUSE Bug 1224697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225725</URL>
      <Description>SUSE Bug 1225725</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225730</URL>
      <Description>SUSE Bug 1225730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226694</URL>
      <Description>SUSE Bug 1226694</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226748</URL>
      <Description>SUSE Bug 1226748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226872</URL>
      <Description>SUSE Bug 1226872</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228405</URL>
      <Description>SUSE Bug 1228405</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230697</URL>
      <Description>SUSE Bug 1230697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230766</URL>
      <Description>SUSE Bug 1230766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231453</URL>
      <Description>SUSE Bug 1231453</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231854</URL>
      <Description>SUSE Bug 1231854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231877</URL>
      <Description>SUSE Bug 1231877</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231909</URL>
      <Description>SUSE Bug 1231909</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232045</URL>
      <Description>SUSE Bug 1232045</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232048</URL>
      <Description>SUSE Bug 1232048</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232166</URL>
      <Description>SUSE Bug 1232166</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232224</URL>
      <Description>SUSE Bug 1232224</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233038</URL>
      <Description>SUSE Bug 1233038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233050</URL>
      <Description>SUSE Bug 1233050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233055</URL>
      <Description>SUSE Bug 1233055</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233096</URL>
      <Description>SUSE Bug 1233096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233112</URL>
      <Description>SUSE Bug 1233112</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233200</URL>
      <Description>SUSE Bug 1233200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233204</URL>
      <Description>SUSE Bug 1233204</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233239</URL>
      <Description>SUSE Bug 1233239</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233467</URL>
      <Description>SUSE Bug 1233467</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233469</URL>
      <Description>SUSE Bug 1233469</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233476</URL>
      <Description>SUSE Bug 1233476</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233488</URL>
      <Description>SUSE Bug 1233488</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233551</URL>
      <Description>SUSE Bug 1233551</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233769</URL>
      <Description>SUSE Bug 1233769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233977</URL>
      <Description>SUSE Bug 1233977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234087</URL>
      <Description>SUSE Bug 1234087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234161</URL>
      <Description>SUSE Bug 1234161</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234240</URL>
      <Description>SUSE Bug 1234240</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234241</URL>
      <Description>SUSE Bug 1234241</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234242</URL>
      <Description>SUSE Bug 1234242</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234243</URL>
      <Description>SUSE Bug 1234243</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234281</URL>
      <Description>SUSE Bug 1234281</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234381</URL>
      <Description>SUSE Bug 1234381</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234437</URL>
      <Description>SUSE Bug 1234437</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234690</URL>
      <Description>SUSE Bug 1234690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234827</URL>
      <Description>SUSE Bug 1234827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234834</URL>
      <Description>SUSE Bug 1234834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234846</URL>
      <Description>SUSE Bug 1234846</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234853</URL>
      <Description>SUSE Bug 1234853</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234891</URL>
      <Description>SUSE Bug 1234891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234898</URL>
      <Description>SUSE Bug 1234898</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234921</URL>
      <Description>SUSE Bug 1234921</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234922</URL>
      <Description>SUSE Bug 1234922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234923</URL>
      <Description>SUSE Bug 1234923</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234971</URL>
      <Description>SUSE Bug 1234971</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235004</URL>
      <Description>SUSE Bug 1235004</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235009</URL>
      <Description>SUSE Bug 1235009</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235031</URL>
      <Description>SUSE Bug 1235031</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235035</URL>
      <Description>SUSE Bug 1235035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235054</URL>
      <Description>SUSE Bug 1235054</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235056</URL>
      <Description>SUSE Bug 1235056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235057</URL>
      <Description>SUSE Bug 1235057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235061</URL>
      <Description>SUSE Bug 1235061</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235073</URL>
      <Description>SUSE Bug 1235073</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235075</URL>
      <Description>SUSE Bug 1235075</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235125</URL>
      <Description>SUSE Bug 1235125</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235138</URL>
      <Description>SUSE Bug 1235138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235249</URL>
      <Description>SUSE Bug 1235249</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235415</URL>
      <Description>SUSE Bug 1235415</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235416</URL>
      <Description>SUSE Bug 1235416</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235417</URL>
      <Description>SUSE Bug 1235417</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235427</URL>
      <Description>SUSE Bug 1235427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235433</URL>
      <Description>SUSE Bug 1235433</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235480</URL>
      <Description>SUSE Bug 1235480</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235577</URL>
      <Description>SUSE Bug 1235577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235584</URL>
      <Description>SUSE Bug 1235584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235708</URL>
      <Description>SUSE Bug 1235708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235759</URL>
      <Description>SUSE Bug 1235759</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235814</URL>
      <Description>SUSE Bug 1235814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235888</URL>
      <Description>SUSE Bug 1235888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235918</URL>
      <Description>SUSE Bug 1235918</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235920</URL>
      <Description>SUSE Bug 1235920</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235952</URL>
      <Description>SUSE Bug 1235952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235964</URL>
      <Description>SUSE Bug 1235964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48742/</URL>
      <Description>SUSE CVE CVE-2022-48742 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49033/</URL>
      <Description>SUSE CVE CVE-2022-49033 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49035/</URL>
      <Description>SUSE CVE CVE-2022-49035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52434/</URL>
      <Description>SUSE CVE CVE-2023-52434 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52922/</URL>
      <Description>SUSE CVE CVE-2023-52922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26976/</URL>
      <Description>SUSE CVE CVE-2024-26976 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35847/</URL>
      <Description>SUSE CVE CVE-2024-35847 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36484/</URL>
      <Description>SUSE CVE CVE-2024-36484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36883/</URL>
      <Description>SUSE CVE CVE-2024-36883 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36886/</URL>
      <Description>SUSE CVE CVE-2024-36886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38589/</URL>
      <Description>SUSE CVE CVE-2024-38589 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41013/</URL>
      <Description>SUSE CVE CVE-2024-41013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46771/</URL>
      <Description>SUSE CVE CVE-2024-46771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47141/</URL>
      <Description>SUSE CVE CVE-2024-47141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47666/</URL>
      <Description>SUSE CVE CVE-2024-47666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47678/</URL>
      <Description>SUSE CVE CVE-2024-47678 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47709/</URL>
      <Description>SUSE CVE CVE-2024-47709 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49925/</URL>
      <Description>SUSE CVE CVE-2024-49925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49944/</URL>
      <Description>SUSE CVE CVE-2024-49944 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50039/</URL>
      <Description>SUSE CVE CVE-2024-50039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50143/</URL>
      <Description>SUSE CVE CVE-2024-50143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50151/</URL>
      <Description>SUSE CVE CVE-2024-50151 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50166/</URL>
      <Description>SUSE CVE CVE-2024-50166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50199/</URL>
      <Description>SUSE CVE CVE-2024-50199 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50211/</URL>
      <Description>SUSE CVE CVE-2024-50211 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50228/</URL>
      <Description>SUSE CVE CVE-2024-50228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50256/</URL>
      <Description>SUSE CVE CVE-2024-50256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50262/</URL>
      <Description>SUSE CVE CVE-2024-50262 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50278/</URL>
      <Description>SUSE CVE CVE-2024-50278 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50280/</URL>
      <Description>SUSE CVE CVE-2024-50280 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50287/</URL>
      <Description>SUSE CVE CVE-2024-50287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50299/</URL>
      <Description>SUSE CVE CVE-2024-50299 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53057/</URL>
      <Description>SUSE CVE CVE-2024-53057 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53101/</URL>
      <Description>SUSE CVE CVE-2024-53101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53112/</URL>
      <Description>SUSE CVE CVE-2024-53112 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53136/</URL>
      <Description>SUSE CVE CVE-2024-53136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53141/</URL>
      <Description>SUSE CVE CVE-2024-53141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53144/</URL>
      <Description>SUSE CVE CVE-2024-53144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53146/</URL>
      <Description>SUSE CVE CVE-2024-53146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53150/</URL>
      <Description>SUSE CVE CVE-2024-53150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53156/</URL>
      <Description>SUSE CVE CVE-2024-53156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53157/</URL>
      <Description>SUSE CVE CVE-2024-53157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53172/</URL>
      <Description>SUSE CVE CVE-2024-53172 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53173/</URL>
      <Description>SUSE CVE CVE-2024-53173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53179/</URL>
      <Description>SUSE CVE CVE-2024-53179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53198/</URL>
      <Description>SUSE CVE CVE-2024-53198 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53210/</URL>
      <Description>SUSE CVE CVE-2024-53210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53214/</URL>
      <Description>SUSE CVE CVE-2024-53214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53224/</URL>
      <Description>SUSE CVE CVE-2024-53224 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53239/</URL>
      <Description>SUSE CVE CVE-2024-53239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53240/</URL>
      <Description>SUSE CVE CVE-2024-53240 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56531/</URL>
      <Description>SUSE CVE CVE-2024-56531 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56548/</URL>
      <Description>SUSE CVE CVE-2024-56548 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56551/</URL>
      <Description>SUSE CVE CVE-2024-56551 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56569/</URL>
      <Description>SUSE CVE CVE-2024-56569 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56570/</URL>
      <Description>SUSE CVE CVE-2024-56570 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56587/</URL>
      <Description>SUSE CVE CVE-2024-56587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56599/</URL>
      <Description>SUSE CVE CVE-2024-56599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-5660/</URL>
      <Description>SUSE CVE CVE-2024-5660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56603/</URL>
      <Description>SUSE CVE CVE-2024-56603 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56604/</URL>
      <Description>SUSE CVE CVE-2024-56604 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56605/</URL>
      <Description>SUSE CVE CVE-2024-56605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56606/</URL>
      <Description>SUSE CVE CVE-2024-56606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56616/</URL>
      <Description>SUSE CVE CVE-2024-56616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56631/</URL>
      <Description>SUSE CVE CVE-2024-56631 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56642/</URL>
      <Description>SUSE CVE CVE-2024-56642 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56664/</URL>
      <Description>SUSE CVE CVE-2024-56664 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56704/</URL>
      <Description>SUSE CVE CVE-2024-56704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56724/</URL>
      <Description>SUSE CVE CVE-2024-56724 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56756/</URL>
      <Description>SUSE CVE CVE-2024-56756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-57791/</URL>
      <Description>SUSE CVE CVE-2024-57791 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-57849/</URL>
      <Description>SUSE CVE CVE-2024-57849 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-57887/</URL>
      <Description>SUSE CVE CVE-2024-57887 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-57888/</URL>
      <Description>SUSE CVE CVE-2024-57888 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-57892/</URL>
      <Description>SUSE CVE CVE-2024-57892 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-57893/</URL>
      <Description>SUSE CVE CVE-2024-57893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-8805/</URL>
      <Description>SUSE CVE CVE-2024-8805 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS">Image SLES12-SP5-EC2-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand">Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand">Image SLES12-SP5-EC2-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS">Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand">Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5" CPE="cpe:/o:suse:sle-live-patching:12:sp5">SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-default-4.12.14-122.244.1">
      <FullProductName ProductID="cluster-md-kmp-default-4.12.14-122.244.1">cluster-md-kmp-default-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-default-4.12.14-122.244.1">
      <FullProductName ProductID="dlm-kmp-default-4.12.14-122.244.1">dlm-kmp-default-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-default-4.12.14-122.244.1">
      <FullProductName ProductID="gfs2-kmp-default-4.12.14-122.244.1">gfs2-kmp-default-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-default-4.12.14-122.244.1">
      <FullProductName ProductID="ocfs2-kmp-default-4.12.14-122.244.1">ocfs2-kmp-default-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-debug-4.12.14-122.244.1">kernel-debug-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-debug-base-4.12.14-122.244.1">kernel-debug-base-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-122.244.1">kernel-debug-devel-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-122.244.1">kernel-default-base-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-122.244.1">kernel-default-devel-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-default-extra-4.12.14-122.244.1">kernel-default-extra-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-default-kgraft-4.12.14-122.244.1">kernel-default-kgraft-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-devel-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-default-kgraft-devel-4.12.14-122.244.1">kernel-default-kgraft-devel-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-default-man-4.12.14-122.244.1">kernel-default-man-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-devel-4.12.14-122.244.1">kernel-devel-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-docs-4.12.14-122.244.1">kernel-docs-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-docs-html-4.12.14-122.244.1">kernel-docs-html-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-122.244.1">kernel-kvmsmall-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-122.244.1">kernel-kvmsmall-base-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-122.244.1">kernel-kvmsmall-devel-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-macros-4.12.14-122.244.1">kernel-macros-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-122.244.1">kernel-obs-build-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-122.244.1">kernel-obs-qa-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-source-4.12.14-122.244.1">kernel-source-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-122.244.1">kernel-source-vanilla-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-syms-4.12.14-122.244.1">kernel-syms-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-vanilla-4.12.14-122.244.1">kernel-vanilla-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-122.244.1">kernel-vanilla-base-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-122.244.1">kernel-vanilla-devel-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-zfcpdump-4.12.14-122.244.1">kernel-zfcpdump-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-man-4.12.14-122.244.1">
      <FullProductName ProductID="kernel-zfcpdump-man-4.12.14-122.244.1">kernel-zfcpdump-man-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-122_244-default-1-8.5.1">
      <FullProductName ProductID="kgraft-patch-4_12_14-122_244-default-1-8.5.1">kgraft-patch-4_12_14-122_244-default-1-8.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-default-4.12.14-122.244.1">
      <FullProductName ProductID="kselftests-kmp-default-4.12.14-122.244.1">kselftests-kmp-default-4.12.14-122.244.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-ECS-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1">cluster-md-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1">dlm-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1">gfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1">ocfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1">cluster-md-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1">dlm-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1">gfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1">ocfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1">cluster-md-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1">dlm-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1">gfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1">ocfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1">cluster-md-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1">dlm-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1">gfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1">ocfs2-kmp-default-4.12.14-122.244.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1">kernel-default-kgraft-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-devel-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1">kernel-default-kgraft-devel-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-4_12_14-122_244-default-1-8.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1">kgraft-patch-4_12_14-122_244-default-1-8.5.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1">cluster-md-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1">dlm-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1">gfs2-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1">kernel-default-base-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1">kernel-default-devel-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1">kernel-default-man-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1">kernel-devel-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1">kernel-macros-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1">kernel-source-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1">kernel-syms-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1">ocfs2-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1">cluster-md-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1">dlm-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1">gfs2-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1">kernel-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1">kernel-default-base-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1">kernel-default-devel-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1">kernel-devel-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1">kernel-macros-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1">kernel-source-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1">kernel-syms-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.244.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1">ocfs2-kmp-default-4.12.14-122.244.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()

While looking at one unrelated syzbot bug, I found the replay logic
in __rtnl_newlink() to potentially trigger use-after-free.

It is better to clear master_dev and m_ops inside the loop,
in case we have to replay it.</Note>
    </Notes>
    <CVE>CVE-2022-48742</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48742.html</URL>
        <Description>CVE-2022-48742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226694</URL>
        <Description>SUSE Bug 1226694</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit()

Syzkaller reported BUG as follows:

  BUG: sleeping function called from invalid context at
       include/linux/sched/mm.h:274
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0xcd/0x134
   __might_resched.cold+0x222/0x26b
   kmem_cache_alloc+0x2e7/0x3c0
   update_qgroup_limit_item+0xe1/0x390
   btrfs_qgroup_inherit+0x147b/0x1ee0
   create_subvol+0x4eb/0x1710
   btrfs_mksubvol+0xfe5/0x13f0
   __btrfs_ioctl_snap_create+0x2b0/0x430
   btrfs_ioctl_snap_create_v2+0x25a/0x520
   btrfs_ioctl+0x2a1c/0x5ce0
   __x64_sys_ioctl+0x193/0x200
   do_syscall_64+0x35/0x80

Fix this by calling qgroup_dirty() on @dstqgroup, and update limit item in
btrfs_run_qgroups() later outside of the spinlock context.</Note>
    </Notes>
    <CVE>CVE-2022-49033</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49033.html</URL>
        <Description>CVE-2022-49033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232045</URL>
        <Description>SUSE Bug 1232045</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE

I expect that the hardware will have limited this to 16, but just in
case it hasn't, check for this corner case.</Note>
    </Notes>
    <CVE>CVE-2022-49035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49035.html</URL>
        <Description>CVE-2022-49035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215304</URL>
        <Description>SUSE Bug 1215304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235013</URL>
        <Description>SUSE Bug 1235013</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential OOBs in smb2_parse_contexts()

Validate offsets and lengths before dereferencing create contexts in
smb2_parse_contexts().

This fixes following oops when accessing invalid create contexts from
server:

  BUG: unable to handle page fault for address: ffff8881178d8cc3
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 4a01067 P4D 4a01067 PUD 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
  RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs]
  Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00
  00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 &lt;0f&gt; b7
  7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00
  RSP: 0018:ffffc900007939e0 EFLAGS: 00010216
  RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90
  RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000
  RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000
  R10: ffff8880180cc000 R11: 0000000000000024 R12: 0000000000000000
  R13: 0000000000000020 R14: 0000000000000000 R15: ffffc90000793c22
  FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000)
  knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffff8881178d8cc3 CR3: 00000000181ca000 CR4: 0000000000750ef0
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   ? __die+0x23/0x70
   ? page_fault_oops+0x181/0x480
   ? search_module_extables+0x19/0x60
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? exc_page_fault+0x1b6/0x1c0
   ? asm_exc_page_fault+0x26/0x30
   ? smb2_parse_contexts+0xa0/0x3a0 [cifs]
   SMB2_open+0x38d/0x5f0 [cifs]
   ? smb2_is_path_accessible+0x138/0x260 [cifs]
   smb2_is_path_accessible+0x138/0x260 [cifs]
   cifs_is_path_remote+0x8d/0x230 [cifs]
   cifs_mount+0x7e/0x350 [cifs]
   cifs_smb3_do_mount+0x128/0x780 [cifs]
   smb3_get_tree+0xd9/0x290 [cifs]
   vfs_get_tree+0x2c/0x100
   ? capable+0x37/0x70
   path_mount+0x2d7/0xb80
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? _raw_spin_unlock_irqrestore+0x44/0x60
   __x64_sys_mount+0x11a/0x150
   do_syscall_64+0x47/0xf0
   entry_SYSCALL_64_after_hwframe+0x6f/0x77
  RIP: 0033:0x7f8737657b1e</Note>
    </Notes>
    <CVE>CVE-2023-52434</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52434.html</URL>
        <Description>CVE-2023-52434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220148</URL>
        <Description>SUSE Bug 1220148</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Fix UAF in bcm_proc_show()

BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80
Read of size 8 at addr ffff888155846230 by task cat/7862

CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xd5/0x150
 print_report+0xc1/0x5e0
 kasan_report+0xba/0xf0
 bcm_proc_show+0x969/0xa80
 seq_read_iter+0x4f6/0x1260
 seq_read+0x165/0x210
 proc_reg_read+0x227/0x300
 vfs_read+0x1d5/0x8d0
 ksys_read+0x11e/0x240
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Allocated by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_kmalloc+0x9e/0xa0
 bcm_sendmsg+0x264b/0x44e0
 sock_sendmsg+0xda/0x180
 ____sys_sendmsg+0x735/0x920
 ___sys_sendmsg+0x11d/0x1b0
 __sys_sendmsg+0xfa/0x1d0
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Freed by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 ____kasan_slab_free+0x161/0x1c0
 slab_free_freelist_hook+0x119/0x220
 __kmem_cache_free+0xb4/0x2e0
 rcu_core+0x809/0x1bd0

bcm_op is freed before procfs entry be removed in bcm_release(),
this lead to bcm_proc_show() may read the freed bcm_op.</Note>
    </Notes>
    <CVE>CVE-2023-52922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52922.html</URL>
        <Description>CVE-2023-52922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233977</URL>
        <Description>SUSE Bug 1233977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: Always flush async #PF workqueue when vCPU is being destroyed

Always flush the per-vCPU async #PF workqueue when a vCPU is clearing its
completion queue, e.g. when a VM and all its vCPUs is being destroyed.
KVM must ensure that none of its workqueue callbacks is running when the
last reference to the KVM _module_ is put.  Gifting a reference to the
associated VM prevents the workqueue callback from dereferencing freed
vCPU/VM memory, but does not prevent the KVM module from being unloaded
before the callback completes.

Drop the misguided VM refcount gifting, as calling kvm_put_kvm() from
async_pf_execute() if kvm_put_kvm() flushes the async #PF workqueue will
result in deadlock.  async_pf_execute() can't return until kvm_put_kvm()
finishes, and kvm_put_kvm() can't return until async_pf_execute() finishes:

 WARNING: CPU: 8 PID: 251 at virt/kvm/kvm_main.c:1435 kvm_put_kvm+0x2d/0x320 [kvm]
 Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel kvm irqbypass
 CPU: 8 PID: 251 Comm: kworker/8:1 Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
 Workqueue: events async_pf_execute [kvm]
 RIP: 0010:kvm_put_kvm+0x2d/0x320 [kvm]
 Call Trace:
  &lt;TASK&gt;
  async_pf_execute+0x198/0x260 [kvm]
  process_one_work+0x145/0x2d0
  worker_thread+0x27e/0x3a0
  kthread+0xba/0xe0
  ret_from_fork+0x2d/0x50
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;
 ---[ end trace 0000000000000000 ]---
 INFO: task kworker/8:1:251 blocked for more than 120 seconds.
       Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:kworker/8:1     state:D stack:0     pid:251   ppid:2      flags:0x00004000
 Workqueue: events async_pf_execute [kvm]
 Call Trace:
  &lt;TASK&gt;
  __schedule+0x33f/0xa40
  schedule+0x53/0xc0
  schedule_timeout+0x12a/0x140
  __wait_for_common+0x8d/0x1d0
  __flush_work.isra.0+0x19f/0x2c0
  kvm_clear_async_pf_completion_queue+0x129/0x190 [kvm]
  kvm_arch_destroy_vm+0x78/0x1b0 [kvm]
  kvm_put_kvm+0x1c1/0x320 [kvm]
  async_pf_execute+0x198/0x260 [kvm]
  process_one_work+0x145/0x2d0
  worker_thread+0x27e/0x3a0
  kthread+0xba/0xe0
  ret_from_fork+0x2d/0x50
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

If kvm_clear_async_pf_completion_queue() actually flushes the workqueue,
then there's no need to gift async_pf_execute() a reference because all
invocations of async_pf_execute() will be forced to complete before the
vCPU and its VM are destroyed/freed.  And that in turn fixes the module
unloading bug as __fput() won't do module_put() on the last vCPU reference
until the vCPU has been freed, e.g. if closing the vCPU file also puts the
last reference to the KVM module.

Note that kvm_check_async_pf_completion() may also take the work item off
the completion queue and so also needs to flush the work queue, as the
work will not be seen by kvm_clear_async_pf_completion_queue().  Waiting
on the workqueue could theoretically delay a vCPU due to waiting for the
work to complete, but that's a very, very small chance, and likely a very
small delay.  kvm_arch_async_page_present_queued() unconditionally makes a
new request, i.e. will effectively delay entering the guest, so the
remaining work is really just:

        trace_kvm_async_pf_completed(addr, cr2_or_gpa);

        __kvm_vcpu_wake_up(vcpu);

        mmput(mm);

and mmput() can't drop the last reference to the page tables if the vCPU is
still alive, i.e. the vCPU won't get stuck tearing down page tables.

Add a helper to do the flushing, specifically to deal with "wakeup all"
work items, as they aren't actually work items, i.e. are never placed in a
workqueue.  Trying to flush a bogus workqueue entry rightly makes
__flush_work() complain (kudos to whoever added that sanity check).

Note, commit 5f6de5cbebee ("KVM: Prevent module exit until al
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26976</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26976.html</URL>
        <Description>CVE-2024-26976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223635</URL>
        <Description>SUSE Bug 1223635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Prevent double free on error

The error handling path in its_vpe_irq_domain_alloc() causes a double free
when its_vpe_init() fails after successfully allocating at least one
interrupt. This happens because its_vpe_irq_domain_free() frees the
interrupts along with the area bitmap and the vprop_page and
its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the
vprop_page again.

Fix this by unconditionally invoking its_vpe_irq_domain_free() which
handles all cases correctly and by removing the bitmap/vprop_page freeing
from its_vpe_irq_domain_alloc().

[ tglx: Massaged change log ]</Note>
    </Notes>
    <CVE>CVE-2024-35847</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35847.html</URL>
        <Description>CVE-2024-35847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224697</URL>
        <Description>SUSE Bug 1224697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: relax socket state check at accept time.

Christoph reported the following splat:

WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0
Modules linked in:
CPU: 1 PID: 772 Comm: syz-executor510 Not tainted 6.9.0-rc7-g7da7119fe22b #56
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
RIP: 0010:__inet_accept+0x1f4/0x4a0 net/ipv4/af_inet.c:759
Code: 04 38 84 c0 0f 85 87 00 00 00 41 c7 04 24 03 00 00 00 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ec b7 da fd &lt;0f&gt; 0b e9 7f fe ff ff e8 e0 b7 da fd 0f 0b e9 fe fe ff ff 89 d9 80
RSP: 0018:ffffc90000c2fc58 EFLAGS: 00010293
RAX: ffffffff836bdd14 RBX: 0000000000000000 RCX: ffff888104668000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff836bdb89 R09: fffff52000185f64
R10: dffffc0000000000 R11: fffff52000185f64 R12: dffffc0000000000
R13: 1ffff92000185f98 R14: ffff88810754d880 R15: ffff8881007b7800
FS:  000000001c772880(0000) GS:ffff88811b280000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb9fcf2e178 CR3: 00000001045d2002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 inet_accept+0x138/0x1d0 net/ipv4/af_inet.c:786
 do_accept+0x435/0x620 net/socket.c:1929
 __sys_accept4_file net/socket.c:1969 [inline]
 __sys_accept4+0x9b/0x110 net/socket.c:1999
 __do_sys_accept net/socket.c:2016 [inline]
 __se_sys_accept net/socket.c:2013 [inline]
 __x64_sys_accept+0x7d/0x90 net/socket.c:2013
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x58/0x100 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x4315f9
Code: fd ff 48 81 c4 80 00 00 00 e9 f1 fe ff ff 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 0f 83 ab b4 fd ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb26d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
RAX: ffffffffffffffda RBX: 0000000000400300 RCX: 00000000004315f9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
RBP: 00000000006e1018 R08: 0000000000400300 R09: 0000000000400300
R10: 0000000000400300 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000040cdf0 R14: 000000000040ce80 R15: 0000000000000055
 &lt;/TASK&gt;

The reproducer invokes shutdown() before entering the listener status.
After commit 94062790aedb ("tcp: defer shutdown(SEND_SHUTDOWN) for
TCP_SYN_RECV sockets"), the above causes the child to reach the accept
syscall in FIN_WAIT1 status.

Eric noted we can relax the existing assertion in __inet_accept()</Note>
    </Notes>
    <CVE>CVE-2024-36484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36484.html</URL>
        <Description>CVE-2024-36484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226872</URL>
        <Description>SUSE Bug 1226872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: fix out-of-bounds access in ops_init

net_alloc_generic is called by net_alloc, which is called without any
locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It
is read twice, first to allocate an array, then to set s.len, which is
later used to limit the bounds of the array access.

It is possible that the array is allocated and another thread is
registering a new pernet ops, increments max_gen_ptrs, which is then used
to set s.len with a larger than allocated length for the variable array.

Fix it by reading max_gen_ptrs only once in net_alloc_generic. If
max_gen_ptrs is later incremented, it will be caught in net_assign_generic.</Note>
    </Notes>
    <CVE>CVE-2024-36883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36883.html</URL>
        <Description>CVE-2024-36883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225725</URL>
        <Description>SUSE Bug 1225725</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: fix UAF in error path

Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported
a UAF in the tipc_buf_append() error path:

BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0
linux/net/core/skbuff.c:1183
Read of size 8 at addr ffff88804d2a7c80 by task poc/8034

CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.0-debian-1.16.0-5 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 __dump_stack linux/lib/dump_stack.c:88
 dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106
 print_address_description linux/mm/kasan/report.c:377
 print_report+0xc4/0x620 linux/mm/kasan/report.c:488
 kasan_report+0xda/0x110 linux/mm/kasan/report.c:601
 kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183
 skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026
 skb_release_all linux/net/core/skbuff.c:1094
 __kfree_skb linux/net/core/skbuff.c:1108
 kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144
 kfree_skb linux/./include/linux/skbuff.h:1244
 tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186
 tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324
 tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824
 tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159
 tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390
 udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108
 udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186
 udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346
 __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422
 ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205
 ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254
 dst_input linux/./include/net/dst.h:461
 ip_rcv_finish linux/net/ipv4/ip_input.c:449
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534
 __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648
 process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976
 __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576
 napi_poll linux/net/core/dev.c:6645
 net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781
 __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553
 do_softirq linux/kernel/softirq.c:454
 do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381
 local_bh_enable linux/./include/linux/bottom_half.h:33
 rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851
 __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378
 dev_queue_xmit linux/./include/linux/netdevice.h:3169
 neigh_hh_output linux/./include/net/neighbour.h:526
 neigh_output linux/./include/net/neighbour.h:540
 ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235
 __ip_finish_output linux/net/ipv4/ip_output.c:313
 __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323
 NF_HOOK_COND linux/./include/linux/netfilter.h:303
 ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433
 dst_output linux/./include/net/dst.h:451
 ip_local_out linux/net/ipv4/ip_output.c:129
 ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492
 udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963
 udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250
 inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850
 sock_sendmsg_nosec linux/net/socket.c:730
 __sock_sendmsg linux/net/socket.c:745
 __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191
 __do_sys_sendto linux/net/socket.c:2203
 __se_sys_sendto linux/net/socket.c:2199
 __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199
 do_syscall_x64 linux/arch/x86/entry/common.c:52
 do_syscall_
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-36886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36886.html</URL>
        <Description>CVE-2024-36886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225730</URL>
        <Description>SUSE Bug 1225730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netrom: fix possible dead-lock in nr_rt_ioctl()

syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1]

Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node)

[1]
WARNING: possible circular locking dependency detected
6.9.0-rc7-syzkaller-02147-g654de42f3fc6 #0 Not tainted
------------------------------------------------------
syz-executor350/5129 is trying to acquire lock:
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_node_lock include/net/netrom.h:152 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:464 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697

but task is already holding lock:
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_rt_ioctl+0x10a/0x1090 net/netrom/nr_route.c:697

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (nr_node_list_lock){+...}-{2:2}:
        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
        __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
        _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
        spin_lock_bh include/linux/spinlock.h:356 [inline]
        nr_remove_node net/netrom/nr_route.c:299 [inline]
        nr_del_node+0x4b4/0x820 net/netrom/nr_route.c:355
        nr_rt_ioctl+0xa95/0x1090 net/netrom/nr_route.c:683
        sock_do_ioctl+0x158/0x460 net/socket.c:1222
        sock_ioctl+0x629/0x8e0 net/socket.c:1341
        vfs_ioctl fs/ioctl.c:51 [inline]
        __do_sys_ioctl fs/ioctl.c:904 [inline]
        __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-&gt; #0 (&amp;nr_node-&gt;node_lock){+...}-{2:2}:
        check_prev_add kernel/locking/lockdep.c:3134 [inline]
        check_prevs_add kernel/locking/lockdep.c:3253 [inline]
        validate_chain+0x18cb/0x58e0 kernel/locking/lockdep.c:3869
        __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
        __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
        _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
        spin_lock_bh include/linux/spinlock.h:356 [inline]
        nr_node_lock include/net/netrom.h:152 [inline]
        nr_dec_obs net/netrom/nr_route.c:464 [inline]
        nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697
        sock_do_ioctl+0x158/0x460 net/socket.c:1222
        sock_ioctl+0x629/0x8e0 net/socket.c:1341
        vfs_ioctl fs/ioctl.c:51 [inline]
        __do_sys_ioctl fs/ioctl.c:904 [inline]
        __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(nr_node_list_lock);
                               lock(&amp;nr_node-&gt;node_lock);
                               lock(nr_node_list_lock);
  lock(&amp;nr_node-&gt;node_lock);

 *** DEADLOCK ***

1 lock held by syz-executor350/5129:
  #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
  #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]
  #0: ffffffff8f70
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-38589</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38589.html</URL>
        <Description>CVE-2024-38589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226748</URL>
        <Description>SUSE Bug 1226748</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfs: don't walk off the end of a directory data block

This adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry
to make sure don't stray beyond valid memory region. Before patching, the
loop simply checks that the start offset of the dup and dep is within the
range. So in a crafted image, if last entry is xfs_dir2_data_unused, we
can change dup-&gt;length to dup-&gt;length-1 and leave 1 byte of space. In the
next traversal, this space will be considered as dup or dep. We may
encounter an out of bound read when accessing the fixed members.

In the patch, we make sure that the remaining bytes large enough to hold
an unused entry before accessing xfs_dir2_data_unused and
xfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make
sure that the remaining bytes large enough to hold a dirent with a
single-byte name before accessing xfs_dir2_data_entry.</Note>
    </Notes>
    <CVE>CVE-2024-41013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41013.html</URL>
        <Description>CVE-2024-41013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228405</URL>
        <Description>SUSE Bug 1228405</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Remove proc entry when dev is unregistered.

syzkaller reported a warning in bcm_connect() below. [0]

The repro calls connect() to vxcan1, removes vxcan1, and calls
connect() with ifindex == 0.

Calling connect() for a BCM socket allocates a proc entry.
Then, bcm_sk(sk)-&gt;bound is set to 1 to prevent further connect().

However, removing the bound device resets bcm_sk(sk)-&gt;bound to 0
in bcm_notify().

The 2nd connect() tries to allocate a proc entry with the same
name and sets NULL to bcm_sk(sk)-&gt;bcm_proc_read, leaking the
original proc entry.

Since the proc entry is available only for connect()ed sockets,
let's clean up the entry when the bound netdev is unregistered.

[0]:
proc_dir_entry 'can-bcm/2456' already registered
WARNING: CPU: 1 PID: 394 at fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375
Modules linked in:
CPU: 1 PID: 394 Comm: syz-executor403 Not tainted 6.10.0-rc7-g852e42cc2dd4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375
Code: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 &lt;0f&gt; 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48
RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246
RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002
RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0
R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec
FS:  00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220
 bcm_connect+0x472/0x840 net/can/bcm.c:1673
 __sys_connect_file net/socket.c:2049 [inline]
 __sys_connect+0x5d2/0x690 net/socket.c:2066
 __do_sys_connect net/socket.c:2076 [inline]
 __se_sys_connect net/socket.c:2073 [inline]
 __x64_sys_connect+0x8f/0x100 net/socket.c:2073
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fbd708b0e5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d
RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040
R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098
R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000
 &lt;/TASK&gt;
remove_proc_entry: removing non-empty directory 'net/can-bcm', leaking at least '2456'</Note>
    </Notes>
    <CVE>CVE-2024-46771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46771.html</URL>
        <Description>CVE-2024-46771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230766</URL>
        <Description>SUSE Bug 1230766</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pinmux: Use sequential access to access desc-&gt;pinmux data

When two client of the same gpio call pinctrl_select_state() for the
same functionality, we are seeing NULL pointer issue while accessing
desc-&gt;mux_owner.

Let's say two processes A, B executing in pin_request() for the same pin
and process A updates the desc-&gt;mux_usecount but not yet updated the
desc-&gt;mux_owner while process B see the desc-&gt;mux_usecount which got
updated by A path and further executes strcmp and while accessing
desc-&gt;mux_owner it crashes with NULL pointer.

Serialize the access to mux related setting with a mutex lock.

	cpu0 (process A)			cpu1(process B)

pinctrl_select_state() {		  pinctrl_select_state() {
  pin_request() {				pin_request() {
  ...
						 ....
    } else {
         desc-&gt;mux_usecount++;
    						desc-&gt;mux_usecount &amp;&amp; strcmp(desc-&gt;mux_owner, owner)) {

         if (desc-&gt;mux_usecount &gt; 1)
               return 0;
         desc-&gt;mux_owner = owner;

  }						}</Note>
    </Notes>
    <CVE>CVE-2024-47141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47141.html</URL>
        <Description>CVE-2024-47141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235708</URL>
        <Description>SUSE Bug 1235708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Set phy-&gt;enable_completion only when we wait for it

pm8001_phy_control() populates the enable_completion pointer with a stack
address, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and
returns. The problem arises when a phy control response comes late.  After
300 ms the pm8001_phy_control() function returns and the passed
enable_completion stack address is no longer valid. Late phy control
response invokes complete() on a dangling enable_completion pointer which
leads to a kernel crash.</Note>
    </Notes>
    <CVE>CVE-2024-47666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47666.html</URL>
        <Description>CVE-2024-47666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231453</URL>
        <Description>SUSE Bug 1231453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

icmp: change the order of rate limits

ICMP messages are ratelimited :

After the blamed commits, the two rate limiters are applied in this order:

1) host wide ratelimit (icmp_global_allow())

2) Per destination ratelimit (inetpeer based)

In order to avoid side-channels attacks, we need to apply
the per destination check first.

This patch makes the following change :

1) icmp_global_allow() checks if the host wide limit is reached.
   But credits are not yet consumed. This is deferred to 3)

2) The per destination limit is checked/updated.
   This might add a new node in inetpeer tree.

3) icmp_global_consume() consumes tokens if prior operations succeeded.

This means that host wide ratelimit is still effective
in keeping inetpeer tree small even under DDOS.

As a bonus, I removed icmp_global.lock as the fast path
can use a lock-free operation.</Note>
    </Notes>
    <CVE>CVE-2024-47678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47678.html</URL>
        <Description>CVE-2024-47678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231854</URL>
        <Description>SUSE Bug 1231854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Clear bo-&gt;bcm_proc_read after remove_proc_entry().

syzbot reported a warning in bcm_release(). [0]

The blamed change fixed another warning that is triggered when
connect() is issued again for a socket whose connect()ed device has
been unregistered.

However, if the socket is just close()d without the 2nd connect(), the
remaining bo-&gt;bcm_proc_read triggers unnecessary remove_proc_entry()
in bcm_release().

Let's clear bo-&gt;bcm_proc_read after remove_proc_entry() in bcm_notify().

[0]
name '4986'
WARNING: CPU: 0 PID: 5234 at fs/proc/generic.c:711 remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Modules linked in:
CPU: 0 UID: 0 PID: 5234 Comm: syz-executor606 Not tainted 6.11.0-rc5-syzkaller-00178-g5517ae241919 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Code: ff eb 05 e8 cb 1e 5e ff 48 8b 5c 24 10 48 c7 c7 e0 f7 aa 8e e8 2a 38 8e 09 90 48 c7 c7 60 3a 1b 8c 48 89 de e8 da 42 20 ff 90 &lt;0f&gt; 0b 90 90 48 8b 44 24 18 48 c7 44 24 40 0e 36 e0 45 49 c7 04 07
RSP: 0018:ffffc9000345fa20 EFLAGS: 00010246
RAX: 2a2d0aee2eb64600 RBX: ffff888032f1f548 RCX: ffff888029431e00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000345fb08 R08: ffffffff8155b2f2 R09: 1ffff1101710519a
R10: dffffc0000000000 R11: ffffed101710519b R12: ffff888011d38640
R13: 0000000000000004 R14: 0000000000000000 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fcfb52722f0 CR3: 000000000e734000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 bcm_release+0x250/0x880 net/can/bcm.c:1578
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbc/0x240 net/socket.c:1421
 __fput+0x24a/0x8a0 fs/file_table.c:422
 task_work_run+0x24f/0x310 kernel/task_work.c:228
 exit_task_work include/linux/task_work.h:40 [inline]
 do_exit+0xa2f/0x27f0 kernel/exit.c:882
 do_group_exit+0x207/0x2c0 kernel/exit.c:1031
 __do_sys_exit_group kernel/exit.c:1042 [inline]
 __se_sys_exit_group kernel/exit.c:1040 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040
 x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcfb51ee969
Code: Unable to access opcode bytes at 0x7fcfb51ee93f.
RSP: 002b:00007ffce0109ca8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fcfb51ee969
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 00007fcfb526f3b0 R08: ffffffffffffffb8 R09: 0000555500000000
R10: 0000555500000000 R11: 0000000000000246 R12: 00007fcfb526f3b0
R13: 0000000000000000 R14: 00007fcfb5271ee0 R15: 00007fcfb51bf160
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-47709</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47709.html</URL>
        <Description>CVE-2024-47709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232048</URL>
        <Description>SUSE Bug 1232048</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: efifb: Register sysfs groups through driver core

The driver core can register and cleanup sysfs groups already.
Make use of that functionality to simplify the error handling and
cleanup.

Also avoid a UAF race during unregistering where the sysctl attributes
were usable after the info struct was freed.</Note>
    </Notes>
    <CVE>CVE-2024-49925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49925.html</URL>
        <Description>CVE-2024-49925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232224</URL>
        <Description>SUSE Bug 1232224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232225</URL>
        <Description>SUSE Bug 1232225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start

In sctp_listen_start() invoked by sctp_inet_listen(), it should set the
sk_state back to CLOSED if sctp_autobind() fails due to whatever reason.

Otherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)-&gt;reuse
is already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)-&gt;bind_hash will
be dereferenced as sk_state is LISTENING, which causes a crash as bind_hash
is NULL.

  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  RIP: 0010:sctp_inet_listen+0x7f0/0xa20 net/sctp/socket.c:8617
  Call Trace:
   &lt;TASK&gt;
   __sys_listen_socket net/socket.c:1883 [inline]
   __sys_listen+0x1b7/0x230 net/socket.c:1894
   __do_sys_listen net/socket.c:1902 [inline]</Note>
    </Notes>
    <CVE>CVE-2024-49944</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49944.html</URL>
        <Description>CVE-2024-49944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232166</URL>
        <Description>SUSE Bug 1232166</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: accept TCA_STAB only for root qdisc

Most qdiscs maintain their backlog using qdisc_pkt_len(skb)
on the assumption it is invariant between the enqueue()
and dequeue() handlers.

Unfortunately syzbot can crash a host rather easily using
a TBF + SFQ combination, with an STAB on SFQ [1]

We can't support TCA_STAB on arbitrary level, this would
require to maintain per-qdisc storage.

[1]
[   88.796496] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   88.798611] #PF: supervisor read access in kernel mode
[   88.799014] #PF: error_code(0x0000) - not-present page
[   88.799506] PGD 0 P4D 0
[   88.799829] Oops: Oops: 0000 [#1] SMP NOPTI
[   88.800569] CPU: 14 UID: 0 PID: 2053 Comm: b371744477 Not tainted 6.12.0-rc1-virtme #1117
[   88.801107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   88.801779] RIP: 0010:sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq
[ 88.802544] Code: 0f b7 50 12 48 8d 04 d5 00 00 00 00 48 89 d6 48 29 d0 48 8b 91 c0 01 00 00 48 c1 e0 03 48 01 c2 66 83 7a 1a 00 7e c0 48 8b 3a &lt;4c&gt; 8b 07 4c 89 02 49 89 50 08 48 c7 47 08 00 00 00 00 48 c7 07 00
All code
========
   0:	0f b7 50 12          	movzwl 0x12(%rax),%edx
   4:	48 8d 04 d5 00 00 00 	lea    0x0(,%rdx,8),%rax
   b:	00
   c:	48 89 d6             	mov    %rdx,%rsi
   f:	48 29 d0             	sub    %rdx,%rax
  12:	48 8b 91 c0 01 00 00 	mov    0x1c0(%rcx),%rdx
  19:	48 c1 e0 03          	shl    $0x3,%rax
  1d:	48 01 c2             	add    %rax,%rdx
  20:	66 83 7a 1a 00       	cmpw   $0x0,0x1a(%rdx)
  25:	7e c0                	jle    0xffffffffffffffe7
  27:	48 8b 3a             	mov    (%rdx),%rdi
  2a:*	4c 8b 07             	mov    (%rdi),%r8		&lt;-- trapping instruction
  2d:	4c 89 02             	mov    %r8,(%rdx)
  30:	49 89 50 08          	mov    %rdx,0x8(%r8)
  34:	48 c7 47 08 00 00 00 	movq   $0x0,0x8(%rdi)
  3b:	00
  3c:	48                   	rex.W
  3d:	c7                   	.byte 0xc7
  3e:	07                   	(bad)
	...

Code starting with the faulting instruction
===========================================
   0:	4c 8b 07             	mov    (%rdi),%r8
   3:	4c 89 02             	mov    %r8,(%rdx)
   6:	49 89 50 08          	mov    %rdx,0x8(%r8)
   a:	48 c7 47 08 00 00 00 	movq   $0x0,0x8(%rdi)
  11:	00
  12:	48                   	rex.W
  13:	c7                   	.byte 0xc7
  14:	07                   	(bad)
	...
[   88.803721] RSP: 0018:ffff9a1f892b7d58 EFLAGS: 00000206
[   88.804032] RAX: 0000000000000000 RBX: ffff9a1f8420c800 RCX: ffff9a1f8420c800
[   88.804560] RDX: ffff9a1f81bc1440 RSI: 0000000000000000 RDI: 0000000000000000
[   88.805056] RBP: ffffffffc04bb0e0 R08: 0000000000000001 R09: 00000000ff7f9a1f
[   88.805473] R10: 000000000001001b R11: 0000000000009a1f R12: 0000000000000140
[   88.806194] R13: 0000000000000001 R14: ffff9a1f886df400 R15: ffff9a1f886df4ac
[   88.806734] FS:  00007f445601a740(0000) GS:ffff9a2e7fd80000(0000) knlGS:0000000000000000
[   88.807225] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   88.807672] CR2: 0000000000000000 CR3: 000000050cc46000 CR4: 00000000000006f0
[   88.808165] Call Trace:
[   88.808459]  &lt;TASK&gt;
[   88.808710] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)
[   88.809261] ? page_fault_oops (arch/x86/mm/fault.c:715)
[   88.809561] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:147 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539)
[   88.809806] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)
[   88.810074] ? sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq
[   88.810411] sfq_reset (net/sched/sch_sfq.c:525) sch_sfq
[   88.810671] qdisc_reset (./include/linux/skbuff.h:2135 ./include/linux/skbuff.h:2441 ./include/linux/skbuff.h:3304 ./include/linux/skbuff.h:3310 net/sched/sch_g
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50039.html</URL>
        <Description>CVE-2024-50039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231909</URL>
        <Description>SUSE Bug 1231909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

udf: fix uninit-value use in udf_get_fileshortad

Check for overflow when computing alen in udf_current_aext to mitigate
later uninit-value use in udf_get_fileshortad KMSAN bug[1].
After applying the patch reproducer did not trigger any issue[2].

[1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df
[2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000</Note>
    </Notes>
    <CVE>CVE-2024-50143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50143.html</URL>
        <Description>CVE-2024-50143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233038</URL>
        <Description>SUSE Bug 1233038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix OOBs when building SMB2_IOCTL request

When using encryption, either enforced by the server or when using
'seal' mount option, the client will squash all compound request buffers
down for encryption into a single iov in smb2_set_next_command().

SMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the
SMB2_IOCTL request in the first iov, and if the user passes an input
buffer that is greater than 328 bytes, smb2_set_next_command() will
end up writing off the end of @rqst-&gt;iov[0].iov_base as shown below:

  mount.cifs //srv/share /mnt -o ...,seal
  ln -s $(perl -e "print('a')for 1..1024") /mnt/link

  BUG: KASAN: slab-out-of-bounds in
  smb2_set_next_command.cold+0x1d6/0x24c [cifs]
  Write of size 4116 at addr ffff8881148fcab8 by task ln/859

  CPU: 1 UID: 0 PID: 859 Comm: ln Not tainted 6.12.0-rc3 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  1.16.3-2.fc40 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   print_report+0x156/0x4d9
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   ? __virt_addr_valid+0x145/0x310
   ? __phys_addr+0x46/0x90
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   kasan_report+0xda/0x110
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   kasan_check_range+0x10f/0x1f0
   __asan_memcpy+0x3c/0x60
   smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   smb2_compound_op+0x238c/0x3840 [cifs]
   ? kasan_save_track+0x14/0x30
   ? kasan_save_free_info+0x3b/0x70
   ? vfs_symlink+0x1a1/0x2c0
   ? do_symlinkat+0x108/0x1c0
   ? __pfx_smb2_compound_op+0x10/0x10 [cifs]
   ? kmem_cache_free+0x118/0x3e0
   ? cifs_get_writable_path+0xeb/0x1a0 [cifs]
   smb2_get_reparse_inode+0x423/0x540 [cifs]
   ? __pfx_smb2_get_reparse_inode+0x10/0x10 [cifs]
   ? rcu_is_watching+0x20/0x50
   ? __kmalloc_noprof+0x37c/0x480
   ? smb2_create_reparse_symlink+0x257/0x490 [cifs]
   ? smb2_create_reparse_symlink+0x38f/0x490 [cifs]
   smb2_create_reparse_symlink+0x38f/0x490 [cifs]
   ? __pfx_smb2_create_reparse_symlink+0x10/0x10 [cifs]
   ? find_held_lock+0x8a/0xa0
   ? hlock_class+0x32/0xb0
   ? __build_path_from_dentry_optional_prefix+0x19d/0x2e0 [cifs]
   cifs_symlink+0x24f/0x960 [cifs]
   ? __pfx_make_vfsuid+0x10/0x10
   ? __pfx_cifs_symlink+0x10/0x10 [cifs]
   ? make_vfsgid+0x6b/0xc0
   ? generic_permission+0x96/0x2d0
   vfs_symlink+0x1a1/0x2c0
   do_symlinkat+0x108/0x1c0
   ? __pfx_do_symlinkat+0x10/0x10
   ? strncpy_from_user+0xaa/0x160
   __x64_sys_symlinkat+0xb9/0xf0
   do_syscall_64+0xbb/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7f08d75c13bb</Note>
    </Notes>
    <CVE>CVE-2024-50151</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50151.html</URL>
        <Description>CVE-2024-50151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233055</URL>
        <Description>SUSE Bug 1233055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fsl/fman: Fix refcount handling of fman-related devices

In mac_probe() there are multiple calls to of_find_device_by_node(),
fman_bind() and fman_port_bind() which takes references to of_dev-&gt;dev.
Not all references taken by these calls are released later on error path
in mac_probe() and in mac_remove() which lead to reference leaks.

Add references release.</Note>
    </Notes>
    <CVE>CVE-2024-50166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50166.html</URL>
        <Description>CVE-2024-50166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233050</URL>
        <Description>SUSE Bug 1233050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/swapfile: skip HugeTLB pages for unuse_vma

I got a bad pud error and lost a 1GB HugeTLB when calling swapoff.  The
problem can be reproduced by the following steps:

 1. Allocate an anonymous 1GB HugeTLB and some other anonymous memory.
 2. Swapout the above anonymous memory.
 3. run swapoff and we will get a bad pud error in kernel message:

  mm/pgtable-generic.c:42: bad pud 00000000743d215d(84000001400000e7)

We can tell that pud_clear_bad is called by pud_none_or_clear_bad in
unuse_pud_range() by ftrace.  And therefore the HugeTLB pages will never
be freed because we lost it from page table.  We can skip HugeTLB pages
for unuse_vma to fix it.</Note>
    </Notes>
    <CVE>CVE-2024-50199</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50199.html</URL>
        <Description>CVE-2024-50199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233112</URL>
        <Description>SUSE Bug 1233112</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

udf: refactor inode_bmap() to handle error

Refactor inode_bmap() to handle error since udf_next_aext() can return
error now. On situations like ftruncate, udf_extend_file() can now
detect errors and bail out early without resorting to checking for
particular offsets and assuming internal behavior of these functions.</Note>
    </Notes>
    <CVE>CVE-2024-50211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50211.html</URL>
        <Description>CVE-2024-50211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233096</URL>
        <Description>SUSE Bug 1233096</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-50228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50228.html</URL>
        <Description>CVE-2024-50228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233204</URL>
        <Description>SUSE Bug 1233204</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()

I got a syzbot report without a repro [1] crashing in nf_send_reset6()

I think the issue is that dev-&gt;hard_header_len is zero, and we attempt
later to push an Ethernet header.

Use LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c.

[1]

skbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
 RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
Code: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 &lt;0f&gt; 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
RSP: 0018:ffffc900045269b0 EFLAGS: 00010282
RAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800
RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000
RBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc
R10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140
R13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c
FS:  00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  skb_push+0xe5/0x100 net/core/skbuff.c:2636
  eth_header+0x38/0x1f0 net/ethernet/eth.c:83
  dev_hard_header include/linux/netdevice.h:3208 [inline]
  nf_send_reset6+0xce6/0x1270 net/ipv6/netfilter/nf_reject_ipv6.c:358
  nft_reject_inet_eval+0x3b9/0x690 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  br_nf_pre_routing_ipv6+0x63e/0x770 net/bridge/br_netfilter_ipv6.c:184
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
  br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
  __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5562
  __netif_receive_skb_one_core net/core/dev.c:5666 [inline]
  __netif_receive_skb+0x12f/0x650 net/core/dev.c:5781
  netif_receive_skb_internal net/core/dev.c:5867 [inline]
  netif_receive_skb+0x1e8/0x890 net/core/dev.c:5926
  tun_rx_batched+0x1b7/0x8f0 drivers/net/tun.c:1550
  tun_get_user+0x3056/0x47e0 drivers/net/tun.c:2007
  tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2053
  new_sync_write fs/read_write.c:590 [inline]
  vfs_write+0xa6d/0xc90 fs/read_write.c:683
  ksys_write+0x183/0x2b0 fs/read_write.c:736
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fdbeeb7d1ff
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48
RSP: 002b:00007fdbee5ff000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fdbeed36058 RCX: 00007fdbeeb7d1ff
RDX: 000000000000008e RSI: 0000000020000040 RDI: 00000000000000c8
RBP: 00007fdbeebf12be R08: 0000000
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50256.html</URL>
        <Description>CVE-2024-50256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233200</URL>
        <Description>SUSE Bug 1233200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix out-of-bounds write in trie_get_next_key()

trie_get_next_key() allocates a node stack with size trie-&gt;max_prefixlen,
while it writes (trie-&gt;max_prefixlen + 1) nodes to the stack when it has
full paths from the root to leaves. For example, consider a trie with
max_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ...
0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with
.prefixlen = 8 make 9 nodes be written on the node stack with size 8.</Note>
    </Notes>
    <CVE>CVE-2024-50262</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50262.html</URL>
        <Description>CVE-2024-50262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233239</URL>
        <Description>SUSE Bug 1233239</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix potential out-of-bounds access on the first resume

Out-of-bounds access occurs if the fast device is expanded unexpectedly
before the first-time resume of the cache table. This happens because
expanding the fast device requires reloading the cache table for
cache_create to allocate new in-core data structures that fit the new
size, and the check in cache_preresume is not performed during the
first resume, leading to the issue.

Reproduce steps:

1. prepare component devices:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct

2. load a cache table of 512 cache blocks, and deliberately expand the
   fast device before resuming the cache, making the in-core data
   structures inadequate.

dmsetup create cache --notable
dmsetup reload cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"
dmsetup reload cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

3. suspend the cache to write out the in-core dirty bitset and hint
   array, leading to out-of-bounds access to the dirty bitset at offset
   0x40:

dmsetup suspend cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80
  Read of size 8 at addr ffffc90000085040 by task dmsetup/90

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc90000085000, ffffc90000087000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
  &gt;ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8
                                             ^
   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by checking the size change on the first resume.</Note>
    </Notes>
    <CVE>CVE-2024-50278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50278.html</URL>
        <Description>CVE-2024-50278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233467</URL>
        <Description>SUSE Bug 1233467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233709</URL>
        <Description>SUSE Bug 1233709</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix flushing uninitialized delayed_work on cache_ctr error

An unexpected WARN_ON from flush_work() may occur when cache creation
fails, caused by destroying the uninitialized delayed_work waker in the
error path of cache_create(). For example, the warning appears on the
superblock checksum error.

Reproduce steps:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

Kernel logs:

(snip)
WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890

Fix by pulling out the cancel_delayed_work_sync() from the constructor's
error path. This patch doesn't affect the use-after-free fix for
concurrent dm_resume and dm_destroy (commit 6a459d8edbdb ("dm cache: Fix
UAF in destroy()")) as cache_dtr is not changed.</Note>
    </Notes>
    <CVE>CVE-2024-50280</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50280.html</URL>
        <Description>CVE-2024-50280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233469</URL>
        <Description>SUSE Bug 1233469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-tpg: prevent the risk of a division by zero

As reported by Coverity, the logic at tpg_precalculate_line()
blindly rescales the buffer even when scaled_witdh is equal to
zero. If this ever happens, this will cause a division by zero.

Instead, add a WARN_ON_ONCE() to trigger such cases and return
without doing any precalculation.</Note>
    </Notes>
    <CVE>CVE-2024-50287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50287.html</URL>
        <Description>CVE-2024-50287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233476</URL>
        <Description>SUSE Bug 1233476</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sctp: properly validate chunk size in sctp_sf_ootb()

A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add
size validation when walking chunks") is also required in sctp_sf_ootb()
to address a crash reported by syzbot:

  BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712
  sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712
  sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166
  sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407
  sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
  sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243
  sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159
  ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233</Note>
    </Notes>
    <CVE>CVE-2024-50299</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50299.html</URL>
        <Description>CVE-2024-50299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233488</URL>
        <Description>SUSE Bug 1233488</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53057</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53057.html</URL>
        <Description>CVE-2024-53057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233551</URL>
        <Description>SUSE Bug 1233551</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs: Fix uninitialized value issue in from_kuid and from_kgid

ocfs2_setattr() uses attr-&gt;ia_mode, attr-&gt;ia_uid and attr-&gt;ia_gid in
a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.

Initialize all fields of newattrs to avoid uninitialized variables, by
checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.</Note>
    </Notes>
    <CVE>CVE-2024-53101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53101.html</URL>
        <Description>CVE-2024-53101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233769</URL>
        <Description>SUSE Bug 1233769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: uncache inode which has failed entering the group

Syzbot has reported the following BUG:

kernel BUG at fs/ocfs2/uptodate.c:509!
...
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x5f/0xb0
 ? die+0x9e/0xc0
 ? do_trap+0x15a/0x3a0
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? do_error_trap+0x1dc/0x2c0
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? __pfx_do_error_trap+0x10/0x10
 ? handle_invalid_op+0x34/0x40
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? exc_invalid_op+0x38/0x50
 ? asm_exc_invalid_op+0x1a/0x20
 ? ocfs2_set_new_buffer_uptodate+0x2e/0x160
 ? ocfs2_set_new_buffer_uptodate+0x144/0x160
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ocfs2_group_add+0x39f/0x15a0
 ? __pfx_ocfs2_group_add+0x10/0x10
 ? __pfx_lock_acquire+0x10/0x10
 ? mnt_get_write_access+0x68/0x2b0
 ? __pfx_lock_release+0x10/0x10
 ? rcu_read_lock_any_held+0xb7/0x160
 ? __pfx_rcu_read_lock_any_held+0x10/0x10
 ? smack_log+0x123/0x540
 ? mnt_get_write_access+0x68/0x2b0
 ? mnt_get_write_access+0x68/0x2b0
 ? mnt_get_write_access+0x226/0x2b0
 ocfs2_ioctl+0x65e/0x7d0
 ? __pfx_ocfs2_ioctl+0x10/0x10
 ? smack_file_ioctl+0x29e/0x3a0
 ? __pfx_smack_file_ioctl+0x10/0x10
 ? lockdep_hardirqs_on_prepare+0x43d/0x780
 ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
 ? __pfx_ocfs2_ioctl+0x10/0x10
 __se_sys_ioctl+0xfb/0x170
 do_syscall_64+0xf3/0x230
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
 &lt;/TASK&gt;

When 'ioctl(OCFS2_IOC_GROUP_ADD, ...)' has failed for the particular
inode in 'ocfs2_verify_group_and_input()', corresponding buffer head
remains cached and subsequent call to the same 'ioctl()' for the same
inode issues the BUG() in 'ocfs2_set_new_buffer_uptodate()' (trying
to cache the same buffer head of that inode). Fix this by uncaching
the buffer head with 'ocfs2_remove_from_cache()' on error path in
'ocfs2_group_add()'.</Note>
    </Notes>
    <CVE>CVE-2024-53112</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53112.html</URL>
        <Description>CVE-2024-53112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234087</URL>
        <Description>SUSE Bug 1234087</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: revert "mm: shmem: fix data-race in shmem_getattr()"

Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1].  It is causing deadlocks when accessing tmpfs over
NFS.

As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem".</Note>
    </Notes>
    <CVE>CVE-2024-53136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53136.html</URL>
        <Description>CVE-2024-53136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234161</URL>
        <Description>SUSE Bug 1234161</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: add missing range check in bitmap_ip_uadt

When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,
the values of ip and ip_to are slightly swapped. Therefore, the range check
for ip should be done later, but this part is missing and it seems that the
vulnerability occurs.

So we should add missing range checks and remove unnecessary range checks.</Note>
    </Notes>
    <CVE>CVE-2024-53141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53141.html</URL>
        <Description>CVE-2024-53141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234381</URL>
        <Description>SUSE Bug 1234381</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE

This aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4
("Bluetooth: Always request for user confirmation for Just Works")
always request user confirmation with confirm_hint set since the
likes of bluetoothd have dedicated policy around JUST_WORKS method
(e.g. main.conf:JustWorksRepairing).

CVE: CVE-2024-8805</Note>
    </Notes>
    <CVE>CVE-2024-53144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53144.html</URL>
        <Description>CVE-2024-53144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234690</URL>
        <Description>SUSE Bug 1234690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent a potential integer overflow

If the tag length is &gt;= U32_MAX - 3 then the "length + 4" addition
can result in an integer overflow. Address this by splitting the
decoding into several steps so that decode_cb_compound4res() does
not have to perform arithmetic on the unsafe length value.</Note>
    </Notes>
    <CVE>CVE-2024-53146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53146.html</URL>
        <Description>CVE-2024-53146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234854</URL>
        <Description>SUSE Bug 1234854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix out of bounds reads when finding clock sources

The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors.  That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.

For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal.  When the descriptor
length is shorter than expected, it's skipped in the loop.

For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.</Note>
    </Notes>
    <CVE>CVE-2024-53150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53150.html</URL>
        <Description>CVE-2024-53150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234834</URL>
        <Description>SUSE Bug 1234834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()

I found the following bug in my fuzzer:

  UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51
  index 255 is out of range for type 'htc_endpoint [22]'
  CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  Workqueue: events request_firmware_work_func
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x180/0x1b0
   __ubsan_handle_out_of_bounds+0xd4/0x130
   htc_issue_send.constprop.0+0x20c/0x230
   ? _raw_spin_unlock_irqrestore+0x3c/0x70
   ath9k_wmi_cmd+0x41d/0x610
   ? mark_held_locks+0x9f/0xe0
   ...

Since this bug has been confirmed to be caused by insufficient verification
of conn_rsp_epid, I think it would be appropriate to add a range check for
conn_rsp_epid to htc_connect_service() to prevent the bug from occurring.</Note>
    </Notes>
    <CVE>CVE-2024-53156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53156.html</URL>
        <Description>CVE-2024-53156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234846</URL>
        <Description>SUSE Bug 1234846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234847</URL>
        <Description>SUSE Bug 1234847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware

Fix a kernel crash with the below call trace when the SCPI firmware
returns OPP count of zero.

dvfs_info.opp_count may be zero on some platforms during the reboot
test, and the kernel will crash after dereferencing the pointer to
kcalloc(info-&gt;count, sizeof(*opp), GFP_KERNEL).

  |  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028
  |  Mem abort info:
  |    ESR = 0x96000004
  |    Exception class = DABT (current EL), IL = 32 bits
  |    SET = 0, FnV = 0
  |    EA = 0, S1PTW = 0
  |  Data abort info:
  |    ISV = 0, ISS = 0x00000004
  |    CM = 0, WnR = 0
  |  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c
  |  [0000000000000028] pgd=0000000000000000
  |  Internal error: Oops: 96000004 [#1] SMP
  |  scpi-hwmon: probe of PHYT000D:00 failed with error -110
  |  Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)
  |  CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1
  |  Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS
  |  pstate: 60000005 (nZCv daif -PAN -UAO)
  |  pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]
  |  lr : clk_register+0x438/0x720
  |  Call trace:
  |   scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]
  |   devm_clk_hw_register+0x50/0xa0
  |   scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]
  |   scpi_clocks_probe+0x528/0x70c [clk_scpi]
  |   platform_drv_probe+0x58/0xa8
  |   really_probe+0x260/0x3d0
  |   driver_probe_device+0x12c/0x148
  |   device_driver_attach+0x74/0x98
  |   __driver_attach+0xb4/0xe8
  |   bus_for_each_dev+0x88/0xe0
  |   driver_attach+0x30/0x40
  |   bus_add_driver+0x178/0x2b0
  |   driver_register+0x64/0x118
  |   __platform_driver_register+0x54/0x60
  |   scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]
  |   do_one_initcall+0x54/0x220
  |   do_init_module+0x54/0x1c8
  |   load_module+0x14a4/0x1668
  |   __se_sys_finit_module+0xf8/0x110
  |   __arm64_sys_finit_module+0x24/0x30
  |   el0_svc_common+0x78/0x170
  |   el0_svc_handler+0x38/0x78
  |   el0_svc+0x8/0x340
  |  Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)
  |  ---[ end trace 06feb22469d89fa8 ]---
  |  Kernel panic - not syncing: Fatal exception
  |  SMP: stopping secondary CPUs
  |  Kernel Offset: disabled
  |  CPU features: 0x10,a0002008
  |  Memory Limit: none</Note>
    </Notes>
    <CVE>CVE-2024-53157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53157.html</URL>
        <Description>CVE-2024-53157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234827</URL>
        <Description>SUSE Bug 1234827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ubi: fastmap: Fix duplicate slab cache names while attaching

Since commit 4c39529663b9 ("slab: Warn on duplicate cache names when
DEBUG_VM=y"), the duplicate slab cache names can be detected and a
kernel WARNING is thrown out.
In UBI fast attaching process, alloc_ai() could be invoked twice
with the same slab cache name 'ubi_aeb_slab_cache', which will trigger
following warning messages:
 kmem_cache of name 'ubi_aeb_slab_cache' already exists
 WARNING: CPU: 0 PID: 7519 at mm/slab_common.c:107
          __kmem_cache_create_args+0x100/0x5f0
 Modules linked in: ubi(+) nandsim [last unloaded: nandsim]
 CPU: 0 UID: 0 PID: 7519 Comm: modprobe Tainted: G 6.12.0-rc2
 RIP: 0010:__kmem_cache_create_args+0x100/0x5f0
 Call Trace:
   __kmem_cache_create_args+0x100/0x5f0
   alloc_ai+0x295/0x3f0 [ubi]
   ubi_attach+0x3c3/0xcc0 [ubi]
   ubi_attach_mtd_dev+0x17cf/0x3fa0 [ubi]
   ubi_init+0x3fb/0x800 [ubi]
   do_init_module+0x265/0x7d0
   __x64_sys_finit_module+0x7a/0xc0

The problem could be easily reproduced by loading UBI device by fastmap
with CONFIG_DEBUG_VM=y.
Fix it by using different slab names for alloc_ai() callers.</Note>
    </Notes>
    <CVE>CVE-2024-53172</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53172.html</URL>
        <Description>CVE-2024-53172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234898</URL>
        <Description>SUSE Bug 1234898</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSv4.0: Fix a use-after-free problem in the asynchronous open()

Yang Erkun reports that when two threads are opening files at the same
time, and are forced to abort before a reply is seen, then the call to
nfs_release_seqid() in nfs4_opendata_free() can result in a
use-after-free of the pointer to the defunct rpc task of the other
thread.
The fix is to ensure that if the RPC call is aborted before the call to
nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()
in nfs4_open_release() before the rpc_task is freed.</Note>
    </Notes>
    <CVE>CVE-2024-53173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53173.html</URL>
        <Description>CVE-2024-53173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234891</URL>
        <Description>SUSE Bug 1234891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234892</URL>
        <Description>SUSE Bug 1234892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free of signing key

Customers have reported use-after-free in @ses-&gt;auth_key.response with
SMB2.1 + sign mounts which occurs due to following race:

task A                         task B
cifs_mount()
 dfs_mount_share()
  get_session()
   cifs_mount_get_session()    cifs_send_recv()
    cifs_get_smb_ses()          compound_send_recv()
     cifs_setup_session()        smb2_setup_request()
      kfree_sensitive()           smb2_calc_signature()
                                   crypto_shash_setkey() *UAF*

Fix this by ensuring that we have a valid @ses-&gt;auth_key.response by
checking whether @ses-&gt;ses_status is SES_GOOD or SES_EXITING with
@ses-&gt;ses_lock held.  After commit 24a9799aa8ef ("smb: client: fix UAF
in smb2_reconnect_server()"), we made sure to call -&gt;logoff() only
when @ses was known to be good (e.g. valid -&gt;auth_key.response), so
it's safe to access signing key when @ses-&gt;ses_status == SES_EXITING.</Note>
    </Notes>
    <CVE>CVE-2024-53179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53179.html</URL>
        <Description>CVE-2024-53179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234921</URL>
        <Description>SUSE Bug 1234921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234927</URL>
        <Description>SUSE Bug 1234927</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xen: Fix the issue of resource not being properly released in xenbus_dev_probe()

This patch fixes an issue in the function xenbus_dev_probe(). In the
xenbus_dev_probe() function, within the if (err) branch at line 313, the
program incorrectly returns err directly without releasing the resources
allocated by err = drv-&gt;probe(dev, id). As the return value is non-zero,
the upper layers assume the processing logic has failed. However, the probe
operation was performed earlier without a corresponding remove operation.
Since the probe actually allocates resources, failing to perform the remove
operation could lead to problems.

To fix this issue, we followed the resource release logic of the
xenbus_dev_remove() function by adding a new block fail_remove before the
fail_put block. After entering the branch if (err) at line 313, the
function will use a goto statement to jump to the fail_remove block,
ensuring that the previously acquired resources are correctly released,
thus preventing the reference count leak.

This bug was identified by an experimental static analysis tool developed
by our team. The tool specializes in analyzing reference count operations
and detecting potential issues where resources are not properly managed.
In this case, the tool flagged the missing release operation as a
potential problem, which led to the development of this patch.</Note>
    </Notes>
    <CVE>CVE-2024-53198</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53198.html</URL>
        <Description>CVE-2024-53198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234923</URL>
        <Description>SUSE Bug 1234923</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()

Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount
(skb-&gt;users) and iucv_sock_recvmsg() does not decrement skb refcount
at exit.
This results in skb memory leak in skb_queue_purge() and WARN_ON in
iucv_sock_destruct() during socket close. To fix this decrease
skb refcount by one if MSG_PEEK is set in order to prevent memory
leak and WARN_ON.

WARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv]
CPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G        W          6.10.0-rc7 #1
Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)
Call Trace:
        [&lt;001587c682c4aa98&gt;] iucv_sock_destruct+0x148/0x1a0 [af_iucv]
        [&lt;001587c682c4a9d0&gt;] iucv_sock_destruct+0x80/0x1a0 [af_iucv]
        [&lt;001587c704117a32&gt;] __sk_destruct+0x52/0x550
        [&lt;001587c704104a54&gt;] __sock_release+0xa4/0x230
        [&lt;001587c704104c0c&gt;] sock_close+0x2c/0x40
        [&lt;001587c702c5f5a8&gt;] __fput+0x2e8/0x970
        [&lt;001587c7024148c4&gt;] task_work_run+0x1c4/0x2c0
        [&lt;001587c7023b0716&gt;] do_exit+0x996/0x1050
        [&lt;001587c7023b13aa&gt;] do_group_exit+0x13a/0x360
        [&lt;001587c7023b1626&gt;] __s390x_sys_exit_group+0x56/0x60
        [&lt;001587c7022bccca&gt;] do_syscall+0x27a/0x380
        [&lt;001587c7049a6a0c&gt;] __do_syscall+0x9c/0x160
        [&lt;001587c7049ce8a8&gt;] system_call+0x70/0x98
        Last Breaking-Event-Address:
        [&lt;001587c682c4a9d4&gt;] iucv_sock_destruct+0x84/0x1a0 [af_iucv]</Note>
    </Notes>
    <CVE>CVE-2024-53210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53210.html</URL>
        <Description>CVE-2024-53210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234971</URL>
        <Description>SUSE Bug 1234971</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Properly hide first-in-list PCIe extended capability

There are cases where a PCIe extended capability should be hidden from
the user. For example, an unknown capability (i.e., capability with ID
greater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally
chosen to be hidden from the user.

Hiding a capability is done by virtualizing and modifying the 'Next
Capability Offset' field of the previous capability so it points to the
capability after the one that should be hidden.

The special case where the first capability in the list should be hidden
is handled differently because there is no previous capability that can
be modified. In this case, the capability ID and version are zeroed
while leaving the next pointer intact. This hides the capability and
leaves an anchor for the rest of the capability list.

However, today, hiding the first capability in the list is not done
properly if the capability is unknown, as struct
vfio_pci_core_device-&gt;pci_config_map is set to the capability ID during
initialization but the capability ID is not properly checked later when
used in vfio_config_do_rw(). This leads to the following warning [1] and
to an out-of-bounds access to ecap_perms array.

Fix it by checking cap_id in vfio_config_do_rw(), and if it is greater
than PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct
read only access instead of the ecap_perms array.

Note that this is safe since the above is the only case where cap_id can
exceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which
are already checked before).

[1]

WARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
CPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1
(snip)
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x69/0x80
 ? __warn+0x8d/0x140
 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
 ? report_bug+0x18f/0x1a0
 ? handle_bug+0x63/0xa0
 ? exc_invalid_op+0x19/0x70
 ? asm_exc_invalid_op+0x1b/0x20
 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
 ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]
 vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]
 vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]
 vfio_device_fops_read+0x27/0x40 [vfio]
 vfs_read+0xbd/0x340
 ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]
 ? __rseq_handle_notify_resume+0xa4/0x4b0
 __x64_sys_pread64+0x96/0xc0
 x64_sys_call+0x1c3d/0x20d0
 do_syscall_64+0x4d/0x120
 entry_SYSCALL_64_after_hwframe+0x76/0x7e</Note>
    </Notes>
    <CVE>CVE-2024-53214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53214.html</URL>
        <Description>CVE-2024-53214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235004</URL>
        <Description>SUSE Bug 1235004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235005</URL>
        <Description>SUSE Bug 1235005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Move events notifier registration to be after device registration

Move pkey change work initialization and cleanup from device resources
stage to notifier stage, since this is the stage which handles this work
events.

Fix a race between the device deregistration and pkey change work by moving
MLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to
ensure that the notifier is deregistered before the device during cleanup.
Which ensures there are no works that are being executed after the
device has already unregistered which can cause the panic below.

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1
Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023
Workqueue: events pkey_change_handler [mlx5_ib]
RIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib]
Code: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 &lt;4c&gt; 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40
RSP: 0018:ffffbcc54068be20 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36
RDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128
RBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001
R10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000
R13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905
FS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
mlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib]
process_one_work+0x1e8/0x3c0
worker_thread+0x50/0x3b0
? rescuer_thread+0x380/0x380
kthread+0x149/0x170
? set_kthread_struct+0x50/0x50
ret_from_fork+0x22/0x30
Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core]
CR2: 0000000000000000
---[ end trace f6f8be4eae12f7bc ]---</Note>
    </Notes>
    <CVE>CVE-2024-53224</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53224.html</URL>
        <Description>CVE-2024-53224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235009</URL>
        <Description>SUSE Bug 1235009</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: 6fire: Release resources at card release

The current 6fire code tries to release the resources right after the
call of usb6fire_chip_abort().  But at this moment, the card object
might be still in use (as we're calling snd_card_free_when_closed()).

For avoid potential UAFs, move the release of resources to the card's
private_free instead of the manual call of usb6fire_chip_destroy() at
the USB disconnect callback.</Note>
    </Notes>
    <CVE>CVE-2024-53239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53239.html</URL>
        <Description>CVE-2024-53239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235054</URL>
        <Description>SUSE Bug 1235054</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235055</URL>
        <Description>SUSE Bug 1235055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xen/netfront: fix crash when removing device

When removing a netfront device directly after a suspend/resume cycle
it might happen that the queues have not been setup again, causing a
crash during the attempt to stop the queues another time.

Fix that by checking the queues are existing before trying to stop
them.

This is XSA-465 / CVE-2024-53240.</Note>
    </Notes>
    <CVE>CVE-2024-53240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53240.html</URL>
        <Description>CVE-2024-53240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234281</URL>
        <Description>SUSE Bug 1234281</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-56531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56531.html</URL>
        <Description>CVE-2024-56531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235057</URL>
        <Description>SUSE Bug 1235057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hfsplus: don't query the device logical block size multiple times

Devices block sizes may change. One of these cases is a loop device by
using ioctl LOOP_SET_BLOCK_SIZE.

While this may cause other issues like IO being rejected, in the case of
hfsplus, it will allocate a block by using that size and potentially write
out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the
latter function reads a different io_size.

Using a new min_io_size initally set to sb_min_blocksize works for the
purposes of the original fix, since it will be set to the max between
HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the
max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not
initialized.

Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024
and 4096.

The produced KASAN report before the fix looks like this:

[  419.944641] ==================================================================
[  419.945655] BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0x659/0xa0a
[  419.946703] Read of size 2 at addr ffff88800721fc00 by task repro/10678
[  419.947612]
[  419.947846] CPU: 0 UID: 0 PID: 10678 Comm: repro Not tainted 6.12.0-rc5-00008-gdf56e0f2f3ca #84
[  419.949007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[  419.950035] Call Trace:
[  419.950384]  &lt;TASK&gt;
[  419.950676]  dump_stack_lvl+0x57/0x78
[  419.951212]  ? hfsplus_read_wrapper+0x659/0xa0a
[  419.951830]  print_report+0x14c/0x49e
[  419.952361]  ? __virt_addr_valid+0x267/0x278
[  419.952979]  ? kmem_cache_debug_flags+0xc/0x1d
[  419.953561]  ? hfsplus_read_wrapper+0x659/0xa0a
[  419.954231]  kasan_report+0x89/0xb0
[  419.954748]  ? hfsplus_read_wrapper+0x659/0xa0a
[  419.955367]  hfsplus_read_wrapper+0x659/0xa0a
[  419.955948]  ? __pfx_hfsplus_read_wrapper+0x10/0x10
[  419.956618]  ? do_raw_spin_unlock+0x59/0x1a9
[  419.957214]  ? _raw_spin_unlock+0x1a/0x2e
[  419.957772]  hfsplus_fill_super+0x348/0x1590
[  419.958355]  ? hlock_class+0x4c/0x109
[  419.958867]  ? __pfx_hfsplus_fill_super+0x10/0x10
[  419.959499]  ? __pfx_string+0x10/0x10
[  419.960006]  ? lock_acquire+0x3e2/0x454
[  419.960532]  ? bdev_name.constprop.0+0xce/0x243
[  419.961129]  ? __pfx_bdev_name.constprop.0+0x10/0x10
[  419.961799]  ? pointer+0x3f0/0x62f
[  419.962277]  ? __pfx_pointer+0x10/0x10
[  419.962761]  ? vsnprintf+0x6c4/0xfba
[  419.963178]  ? __pfx_vsnprintf+0x10/0x10
[  419.963621]  ? setup_bdev_super+0x376/0x3b3
[  419.964029]  ? snprintf+0x9d/0xd2
[  419.964344]  ? __pfx_snprintf+0x10/0x10
[  419.964675]  ? lock_acquired+0x45c/0x5e9
[  419.965016]  ? set_blocksize+0x139/0x1c1
[  419.965381]  ? sb_set_blocksize+0x6d/0xae
[  419.965742]  ? __pfx_hfsplus_fill_super+0x10/0x10
[  419.966179]  mount_bdev+0x12f/0x1bf
[  419.966512]  ? __pfx_mount_bdev+0x10/0x10
[  419.966886]  ? vfs_parse_fs_string+0xce/0x111
[  419.967293]  ? __pfx_vfs_parse_fs_string+0x10/0x10
[  419.967702]  ? __pfx_hfsplus_mount+0x10/0x10
[  419.968073]  legacy_get_tree+0x104/0x178
[  419.968414]  vfs_get_tree+0x86/0x296
[  419.968751]  path_mount+0xba3/0xd0b
[  419.969157]  ? __pfx_path_mount+0x10/0x10
[  419.969594]  ? kmem_cache_free+0x1e2/0x260
[  419.970311]  do_mount+0x99/0xe0
[  419.970630]  ? __pfx_do_mount+0x10/0x10
[  419.971008]  __do_sys_mount+0x199/0x1c9
[  419.971397]  do_syscall_64+0xd0/0x135
[  419.971761]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  419.972233] RIP: 0033:0x7c3cb812972e
[  419.972564] Code: 48 8b 0d f5 46 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d c2 46 0d 00 f7 d8 64 89 01 48
[  419.974371] RSP: 002b:00007ffe30632548 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5
[  419.975048] RAX: ffffffffffffffda RBX: 00007ffe306328d8 RCX: 00007c3cb812972e
[  419.975701] RDX: 0000000020000000 RSI: 0000000020000c80 RDI:
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-56548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56548.html</URL>
        <Description>CVE-2024-56548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235073</URL>
        <Description>SUSE Bug 1235073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235074</URL>
        <Description>SUSE Bug 1235074</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix usage slab after free

[  +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147

[  +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1
[  +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.000016] Call Trace:
[  +0.000008]  &lt;TASK&gt;
[  +0.000009]  dump_stack_lvl+0x76/0xa0
[  +0.000017]  print_report+0xce/0x5f0
[  +0.000017]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  ? srso_return_thunk+0x5/0x5f
[  +0.000015]  ? kasan_complete_mode_report_info+0x72/0x200
[  +0.000016]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  kasan_report+0xbe/0x110
[  +0.000015]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000023]  __asan_report_load8_noabort+0x14/0x30
[  +0.000014]  drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000016]  ? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? enable_work+0x124/0x220
[  +0.000015]  ? __pfx_enable_work+0x10/0x10
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? free_large_kmalloc+0x85/0xf0
[  +0.000016]  drm_sched_entity_destroy+0x18/0x30 [gpu_sched]
[  +0.000020]  amdgpu_vce_sw_fini+0x55/0x170 [amdgpu]
[  +0.000735]  ? __kasan_check_read+0x11/0x20
[  +0.000016]  vce_v4_0_sw_fini+0x80/0x110 [amdgpu]
[  +0.000726]  amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu]
[  +0.000679]  ? mutex_unlock+0x80/0xe0
[  +0.000017]  ? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu]
[  +0.000662]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? mutex_unlock+0x80/0xe0
[  +0.000016]  amdgpu_driver_release_kms+0x16/0x80 [amdgpu]
[  +0.000663]  drm_minor_release+0xc9/0x140 [drm]
[  +0.000081]  drm_release+0x1fd/0x390 [drm]
[  +0.000082]  __fput+0x36c/0xad0
[  +0.000018]  __fput_sync+0x3c/0x50
[  +0.000014]  __x64_sys_close+0x7d/0xe0
[  +0.000014]  x64_sys_call+0x1bc6/0x2680
[  +0.000014]  do_syscall_64+0x70/0x130
[  +0.000014]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit_to_user_mode+0x60/0x190
[  +0.000015]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit+0x43/0x50
[  +0.000012]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? exc_page_fault+0x7c/0x110
[  +0.000015]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  +0.000014] RIP: 0033:0x7ffff7b14f67
[  +0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff
[  +0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  +0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67
[  +0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003
[  +0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000
[  +0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8
[  +0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040
[  +0.000020]  &lt;/TASK&gt;

[  +0.000016] Allocated by task 383 on cpu 7 at 26.880319s:
[  +0.000014]  kasan_save_stack+0x28/0x60
[  +0.000008]  kasan_save_track+0x18/0x70
[  +0.000007]  kasan_save_alloc_info+0x38/0x60
[  +0.000007]  __kasan_kmalloc+0xc1/0xd0
[  +0.000007]  kmalloc_trace_noprof+0x180/0x380
[  +0.000007]  drm_sched_init+0x411/0xec0 [gpu_sched]
[  +0.000012]  amdgpu_device_init+0x695f/0xa610 [amdgpu]
[  +0.000658]  amdgpu_driver_load_kms+0x1a/0x120 [amdgpu]
[  +0.000662]  amdgpu_pci_p
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-56551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56551.html</URL>
        <Description>CVE-2024-56551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235075</URL>
        <Description>SUSE Bug 1235075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235102</URL>
        <Description>SUSE Bug 1235102</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix regression with module command in stack_trace_filter

When executing the following command:

    # echo "write*:mod:ext3" &gt; /sys/kernel/tracing/stack_trace_filter

The current mod command causes a null pointer dereference. While commit
0f17976568b3f ("ftrace: Fix regression with module command in stack_trace_filter")
has addressed part of the issue, it left a corner case unhandled, which still
results in a kernel crash.</Note>
    </Notes>
    <CVE>CVE-2024-56569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56569.html</URL>
        <Description>CVE-2024-56569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235031</URL>
        <Description>SUSE Bug 1235031</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ovl: Filter invalid inodes with missing lookup function

Add a check to the ovl_dentry_weird() function to prevent the
processing of directory inodes that lack the lookup function.
This is important because such inodes can cause errors in overlayfs
when passed to the lowerstack.</Note>
    </Notes>
    <CVE>CVE-2024-56570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56570.html</URL>
        <Description>CVE-2024-56570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235035</URL>
        <Description>SUSE Bug 1235035</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

leds: class: Protect brightness_show() with led_cdev-&gt;led_access mutex

There is NULL pointer issue observed if from Process A where hid device
being added which results in adding a led_cdev addition and later a
another call to access of led_cdev attribute from Process B can result
in NULL pointer issue.

Use mutex led_cdev-&gt;led_access to protect access to led-&gt;cdev and its
attribute inside brightness_show() and max_brightness_show() and also
update the comment for mutex that it should be used to protect the led
class device fields.

	Process A 				Process B

 kthread+0x114
 worker_thread+0x244
 process_scheduled_works+0x248
 uhid_device_add_worker+0x24
 hid_add_device+0x120
 device_add+0x268
 bus_probe_device+0x94
 device_initial_probe+0x14
 __device_attach+0xfc
 bus_for_each_drv+0x10c
 __device_attach_driver+0x14c
 driver_probe_device+0x3c
 __driver_probe_device+0xa0
 really_probe+0x190
 hid_device_probe+0x130
 ps_probe+0x990
 ps_led_register+0x94
 devm_led_classdev_register_ext+0x58
 led_classdev_register_ext+0x1f8
 device_create_with_groups+0x48
 device_create_groups_vargs+0xc8
 device_add+0x244
 kobject_uevent+0x14
 kobject_uevent_env[jt]+0x224
 mutex_unlock[jt]+0xc4
 __mutex_unlock_slowpath+0xd4
 wake_up_q+0x70
 try_to_wake_up[jt]+0x48c
 preempt_schedule_common+0x28
 __schedule+0x628
 __switch_to+0x174
						el0t_64_sync+0x1a8/0x1ac
						el0t_64_sync_handler+0x68/0xbc
						el0_svc+0x38/0x68
						do_el0_svc+0x1c/0x28
						el0_svc_common+0x80/0xe0
						invoke_syscall+0x58/0x114
						__arm64_sys_read+0x1c/0x2c
						ksys_read+0x78/0xe8
						vfs_read+0x1e0/0x2c8
						kernfs_fop_read_iter+0x68/0x1b4
						seq_read_iter+0x158/0x4ec
						kernfs_seq_show+0x44/0x54
						sysfs_kf_seq_show+0xb4/0x130
						dev_attr_show+0x38/0x74
						brightness_show+0x20/0x4c
						dualshock4_led_get_brightness+0xc/0x74

[ 3313.874295][ T4013] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060
[ 3313.874301][ T4013] Mem abort info:
[ 3313.874303][ T4013]   ESR = 0x0000000096000006
[ 3313.874305][ T4013]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 3313.874307][ T4013]   SET = 0, FnV = 0
[ 3313.874309][ T4013]   EA = 0, S1PTW = 0
[ 3313.874311][ T4013]   FSC = 0x06: level 2 translation fault
[ 3313.874313][ T4013] Data abort info:
[ 3313.874314][ T4013]   ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000
[ 3313.874316][ T4013]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 3313.874318][ T4013]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 3313.874320][ T4013] user pgtable: 4k pages, 39-bit VAs, pgdp=00000008f2b0a000
..

[ 3313.874332][ T4013] Dumping ftrace buffer:
[ 3313.874334][ T4013]    (ftrace buffer empty)
..
..
[ dd3313.874639][ T4013] CPU: 6 PID: 4013 Comm: InputReader
[ 3313.874648][ T4013] pc : dualshock4_led_get_brightness+0xc/0x74
[ 3313.874653][ T4013] lr : led_update_brightness+0x38/0x60
[ 3313.874656][ T4013] sp : ffffffc0b910bbd0
..
..
[ 3313.874685][ T4013] Call trace:
[ 3313.874687][ T4013]  dualshock4_led_get_brightness+0xc/0x74
[ 3313.874690][ T4013]  brightness_show+0x20/0x4c
[ 3313.874692][ T4013]  dev_attr_show+0x38/0x74
[ 3313.874696][ T4013]  sysfs_kf_seq_show+0xb4/0x130
[ 3313.874700][ T4013]  kernfs_seq_show+0x44/0x54
[ 3313.874703][ T4013]  seq_read_iter+0x158/0x4ec
[ 3313.874705][ T4013]  kernfs_fop_read_iter+0x68/0x1b4
[ 3313.874708][ T4013]  vfs_read+0x1e0/0x2c8
[ 3313.874711][ T4013]  ksys_read+0x78/0xe8
[ 3313.874714][ T4013]  __arm64_sys_read+0x1c/0x2c
[ 3313.874718][ T4013]  invoke_syscall+0x58/0x114
[ 3313.874721][ T4013]  el0_svc_common+0x80/0xe0
[ 3313.874724][ T4013]  do_el0_svc+0x1c/0x28
[ 3313.874727][ T4013]  el0_svc+0x38/0x68
[ 3313.874730][ T4013]  el0t_64_sync_handler+0x68/0xbc
[ 3313.874732][ T4013]  el0t_64_sync+0x1a8/0x1ac</Note>
    </Notes>
    <CVE>CVE-2024-56587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56587.html</URL>
        <Description>CVE-2024-56587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235125</URL>
        <Description>SUSE Bug 1235125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: avoid NULL pointer error during sdio remove

When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio
workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON
is set to yes, kernel panic will happen:
Call trace:
 destroy_workqueue+0x1c/0x258
 ath10k_sdio_remove+0x84/0x94
 sdio_bus_remove+0x50/0x16c
 device_release_driver_internal+0x188/0x25c
 device_driver_detach+0x20/0x2c

This is because during 'rmmod ath10k', ath10k_sdio_remove() will call
ath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()
will finally be called in ath10k_core_destroy(). This function will free
struct cfg80211_registered_device *rdev and all its members, including
wiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio
workqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.

After device release, destroy_workqueue() will use NULL pointer then the
kernel panic happen.

Call trace:
ath10k_sdio_remove
  -&gt;ath10k_core_unregister
    ……
    -&gt;ath10k_core_stop
      -&gt;ath10k_hif_stop
        -&gt;ath10k_sdio_irq_disable
    -&gt;ath10k_hif_power_down
      -&gt;del_timer_sync(&amp;ar_sdio-&gt;sleep_timer)
  -&gt;ath10k_core_destroy
    -&gt;ath10k_mac_destroy
      -&gt;ieee80211_free_hw
        -&gt;wiphy_free
    ……
          -&gt;wiphy_dev_release
  -&gt;destroy_workqueue

Need to call destroy_workqueue() before ath10k_core_destroy(), free
the work queue buffer first and then free pointer of work queue by
ath10k_core_destroy(). This order matches the error path order in
ath10k_sdio_probe().

No work will be queued on sdio workqueue between it is destroyed and
ath10k_core_destroy() is called. Based on the call_stack above, the
reason is:
Only ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and
ath10k_sdio_irq_disable() will queue work on sdio workqueue.
Sleep timer will be deleted before ath10k_core_destroy() in
ath10k_hif_power_down().
ath10k_sdio_irq_disable() only be called in ath10k_hif_stop().
ath10k_core_unregister() will call ath10k_hif_power_down() to stop hif
bus, so ath10k_sdio_hif_tx_sg() won't be called anymore.

Tested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189</Note>
    </Notes>
    <CVE>CVE-2024-56599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56599.html</URL>
        <Description>CVE-2024-56599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235138</URL>
        <Description>SUSE Bug 1235138</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use of Hardware Page Aggregation (HPA) and Stage-1 and/or Stage-2 translation on Cortex-A77, Cortex-A78, Cortex-A78C, Cortex-A78AE, Cortex-A710, Cortex-X1, Cortex-X1C, Cortex-X2, Cortex-X3, Cortex-X4, Cortex-X925, Neoverse V1, Neoverse V2, Neoverse V3, Neoverse V3AE, Neoverse N2 may permit bypass of Stage-2 translation and/or GPT protection.</Note>
    </Notes>
    <CVE>CVE-2024-5660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-5660.html</URL>
        <Description>CVE-2024-5660</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: af_can: do not leave a dangling sk pointer in can_create()

On error can_create() frees the allocated sk object, but sock_init_data()
has already attached it to the provided sock object. This will leave a
dangling sk pointer in the sock object and may cause use-after-free later.</Note>
    </Notes>
    <CVE>CVE-2024-56603</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56603.html</URL>
        <Description>CVE-2024-56603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235415</URL>
        <Description>SUSE Bug 1235415</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()

bt_sock_alloc() attaches allocated sk object to the provided sock object.
If rfcomm_dlc_alloc() fails, we release the sk object, but leave the
dangling pointer in the sock object, which may cause use-after-free.

Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().</Note>
    </Notes>
    <CVE>CVE-2024-56604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56604.html</URL>
        <Description>CVE-2024-56604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235056</URL>
        <Description>SUSE Bug 1235056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235058</URL>
        <Description>SUSE Bug 1235058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()

bt_sock_alloc() allocates the sk object and attaches it to the provided
sock object. On error l2cap_sock_alloc() frees the sk object, but the
dangling pointer is still attached to the sock object, which may create
use-after-free in other code.</Note>
    </Notes>
    <CVE>CVE-2024-56605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56605.html</URL>
        <Description>CVE-2024-56605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234853</URL>
        <Description>SUSE Bug 1234853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235061</URL>
        <Description>SUSE Bug 1235061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235062</URL>
        <Description>SUSE Bug 1235062</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

af_packet: avoid erroring out after sock_init_data() in packet_create()

After sock_init_data() the allocated sk object is attached to the provided
sock object. On error, packet_create() frees the sk object leaving the
dangling pointer in the sock object on return. Some other code may try
to use this pointer and cause use-after-free.</Note>
    </Notes>
    <CVE>CVE-2024-56606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56606.html</URL>
        <Description>CVE-2024-56606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235417</URL>
        <Description>SUSE Bug 1235417</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/dp_mst: Fix MST sideband message body length check

Fix the MST sideband message body length check, which must be at least 1
byte accounting for the message body CRC (aka message data CRC) at the
end of the message.

This fixes a case where an MST branch device returns a header with a
correct header CRC (indicating a correctly received body length), with
the body length being incorrectly set to 0. This will later lead to a
memory corruption in drm_dp_sideband_append_payload() and the following
errors in dmesg:

   UBSAN: array-index-out-of-bounds in drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25
   index -1 is out of range for type 'u8 [48]'
   Call Trace:
    drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper]
    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]
    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]

   memcpy: detected field-spanning write (size 18446744073709551615) of single field "&amp;msg-&gt;msg[msg-&gt;curlen]" at drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (size 256)
   Call Trace:
    drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper]
    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]
    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]</Note>
    </Notes>
    <CVE>CVE-2024-56616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56616.html</URL>
        <Description>CVE-2024-56616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235427</URL>
        <Description>SUSE Bug 1235427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Fix slab-use-after-free read in sg_release()

Fix a use-after-free bug in sg_release(), detected by syzbot with KASAN:

BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30
kernel/locking/lockdep.c:5838
__mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912
sg_release+0x1f4/0x2e0 drivers/scsi/sg.c:407

In sg_release(), the function kref_put(&amp;sfp-&gt;f_ref, sg_remove_sfp) is
called before releasing the open_rel_lock mutex. The kref_put() call may
decrement the reference count of sfp to zero, triggering its cleanup
through sg_remove_sfp(). This cleanup includes scheduling deferred work
via sg_remove_sfp_usercontext(), which ultimately frees sfp.

After kref_put(), sg_release() continues to unlock open_rel_lock and may
reference sfp or sdp. If sfp has already been freed, this results in a
slab-use-after-free error.

Move the kref_put(&amp;sfp-&gt;f_ref, sg_remove_sfp) call after unlocking the
open_rel_lock mutex. This ensures:

 - No references to sfp or sdp occur after the reference count is
   decremented.

 - Cleanup functions such as sg_remove_sfp() and
   sg_remove_sfp_usercontext() can safely execute without impacting the
   mutex handling in sg_release().

The fix has been tested and validated by syzbot. This patch closes the
bug reported at the following syzkaller link and ensures proper
sequencing of resource cleanup and mutex operations, eliminating the
risk of use-after-free errors in sg_release().</Note>
    </Notes>
    <CVE>CVE-2024-56631</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56631.html</URL>
        <Description>CVE-2024-56631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235480</URL>
        <Description>SUSE Bug 1235480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235482</URL>
        <Description>SUSE Bug 1235482</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free of kernel socket in cleanup_bearer().

syzkaller reported a use-after-free of UDP kernel socket
in cleanup_bearer() without repro. [0][1]

When bearer_disable() calls tipc_udp_disable(), cleanup
of the UDP kernel socket is deferred by work calling
cleanup_bearer().

tipc_exit_net() waits for such works to finish by checking
tipc_net(net)-&gt;wq_count.  However, the work decrements the
count too early before releasing the kernel socket,
unblocking cleanup_net() and resulting in use-after-free.

Let's move the decrement after releasing the socket in
cleanup_bearer().

[0]:
ref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at
     sk_alloc+0x438/0x608
     inet_create+0x4c8/0xcb0
     __sock_create+0x350/0x6b8
     sock_create_kern+0x58/0x78
     udp_sock_create4+0x68/0x398
     udp_sock_create+0x88/0xc8
     tipc_udp_enable+0x5e8/0x848
     __tipc_nl_bearer_enable+0x84c/0xed8
     tipc_nl_bearer_enable+0x38/0x60
     genl_family_rcv_msg_doit+0x170/0x248
     genl_rcv_msg+0x400/0x5b0
     netlink_rcv_skb+0x1dc/0x398
     genl_rcv+0x44/0x68
     netlink_unicast+0x678/0x8b0
     netlink_sendmsg+0x5e4/0x898
     ____sys_sendmsg+0x500/0x830

[1]:
BUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]
BUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
 udp_hashslot include/net/udp.h:85 [inline]
 udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
 sk_common_release+0xaf/0x3f0 net/core/sock.c:3820
 inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437
 inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489
 __sock_release net/socket.c:658 [inline]
 sock_release+0xa0/0x210 net/socket.c:686
 cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
 kthread+0x531/0x6b0 kernel/kthread.c:389
 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244

Uninit was created at:
 slab_free_hook mm/slub.c:2269 [inline]
 slab_free mm/slub.c:4580 [inline]
 kmem_cache_free+0x207/0xc40 mm/slub.c:4682
 net_free net/core/net_namespace.c:454 [inline]
 cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
 kthread+0x531/0x6b0 kernel/kthread.c:389
 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244

CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Workqueue: events cleanup_bearer</Note>
    </Notes>
    <CVE>CVE-2024-56642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56642.html</URL>
        <Description>CVE-2024-56642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235433</URL>
        <Description>SUSE Bug 1235433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235434</URL>
        <Description>SUSE Bug 1235434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix race between element replace and close()

Element replace (with a socket different from the one stored) may race
with socket's close() link popping &amp; unlinking. __sock_map_delete()
unconditionally unrefs the (wrong) element:

// set map[0] = s0
map_update_elem(map, 0, s0)

// drop fd of s0
close(s0)
  sock_map_close()
    lock_sock(sk)               (s0!)
    sock_map_remove_links(sk)
      link = sk_psock_link_pop()
      sock_map_unlink(sk, link)
        sock_map_delete_from_link
                                        // replace map[0] with s1
                                        map_update_elem(map, 0, s1)
                                          sock_map_update_elem
                                (s1!)       lock_sock(sk)
                                            sock_map_update_common
                                              psock = sk_psock(sk)
                                              spin_lock(&amp;stab-&gt;lock)
                                              osk = stab-&gt;sks[idx]
                                              sock_map_add_link(..., &amp;stab-&gt;sks[idx])
                                              sock_map_unref(osk, &amp;stab-&gt;sks[idx])
                                                psock = sk_psock(osk)
                                                sk_psock_put(sk, psock)
                                                  if (refcount_dec_and_test(&amp;psock))
                                                    sk_psock_drop(sk, psock)
                                              spin_unlock(&amp;stab-&gt;lock)
                                            unlock_sock(sk)
          __sock_map_delete
            spin_lock(&amp;stab-&gt;lock)
            sk = *psk                        // s1 replaced s0; sk == s1
            if (!sk_test || sk_test == sk)   // sk_test (s0) != sk (s1); no branch
              sk = xchg(psk, NULL)
            if (sk)
              sock_map_unref(sk, psk)        // unref s1; sks[idx] will dangle
                psock = sk_psock(sk)
                sk_psock_put(sk, psock)
                  if (refcount_dec_and_test())
                    sk_psock_drop(sk, psock)
            spin_unlock(&amp;stab-&gt;lock)
    release_sock(sk)

Then close(map) enqueues bpf_map_free_deferred, which finally calls
sock_map_free(). This results in some refcount_t warnings along with
a KASAN splat [1].

Fix __sock_map_delete(), do not allow sock_map_unref() on elements that
may have been replaced.

[1]:
BUG: KASAN: slab-use-after-free in sock_map_free+0x10e/0x330
Write of size 4 at addr ffff88811f5b9100 by task kworker/u64:12/1063

CPU: 14 UID: 0 PID: 1063 Comm: kworker/u64:12 Not tainted 6.12.0+ #125
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014
Workqueue: events_unbound bpf_map_free_deferred
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x68/0x90
 print_report+0x174/0x4f6
 kasan_report+0xb9/0x190
 kasan_check_range+0x10f/0x1e0
 sock_map_free+0x10e/0x330
 bpf_map_free_deferred+0x173/0x320
 process_one_work+0x846/0x1420
 worker_thread+0x5b3/0xf80
 kthread+0x29e/0x360
 ret_from_fork+0x2d/0x70
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 1202:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 __kasan_slab_alloc+0x85/0x90
 kmem_cache_alloc_noprof+0x131/0x450
 sk_prot_alloc+0x5b/0x220
 sk_alloc+0x2c/0x870
 unix_create1+0x88/0x8a0
 unix_create+0xc5/0x180
 __sock_create+0x241/0x650
 __sys_socketpair+0x1ce/0x420
 __x64_sys_socketpair+0x92/0x100
 do_syscall_64+0x93/0x180
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 46:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 kasan_save_free_info+0x37/0x60
 __kasan_slab_free+0x4b/0x70
 kmem_cache_free+0x1a1/0x590
 __sk_destruct+0x388/0x5a0
 sk_psock_destroy+0x73e/0xa50
 process_one_work+0x846/0x1420
 worker_thread+0x5b3/0xf80
 kthread+0x29e/0x360
 ret_from_fork+0x2d/0x70
 ret_from_fork_asm+0x1a/0x30

The bu
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-56664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56664.html</URL>
        <Description>CVE-2024-56664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235249</URL>
        <Description>SUSE Bug 1235249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235250</URL>
        <Description>SUSE Bug 1235250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

9p/xen: fix release of IRQ

Kernel logs indicate an IRQ was double-freed.

Pass correct device ID during IRQ release.

[Dominique: remove confusing variable reset to 0]</Note>
    </Notes>
    <CVE>CVE-2024-56704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56704.html</URL>
        <Description>CVE-2024-56704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235584</URL>
        <Description>SUSE Bug 1235584</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device

While design wise the idea of converting the driver to use
the hierarchy of the IRQ chips is correct, the implementation
has (inherited) flaws. This was unveiled when platform_get_irq()
had started WARN() on IRQ 0 that is supposed to be a Linux
IRQ number (also known as vIRQ).

Rework the driver to respect IRQ domain when creating each MFD
device separately, as the domain is not the same for all of them.</Note>
    </Notes>
    <CVE>CVE-2024-56724</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56724.html</URL>
        <Description>CVE-2024-56724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235577</URL>
        <Description>SUSE Bug 1235577</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix freeing of the HMB descriptor table

The HMB descriptor table is sized to the maximum number of descriptors
that could be used for a given device, but __nvme_alloc_host_mem could
break out of the loop earlier on memory allocation failure and end up
using less descriptors than planned for, which leads to an incorrect
size passed to dma_free_coherent.

In practice this was not showing up because the number of descriptors
tends to be low and the dma coherent allocator always allocates and
frees at least a page.</Note>
    </Notes>
    <CVE>CVE-2024-56756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56756.html</URL>
        <Description>CVE-2024-56756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234922</URL>
        <Description>SUSE Bug 1234922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: check return value of sock_recvmsg when draining clc data

When receiving clc msg, the field length in smc_clc_msg_hdr indicates the
length of msg should be received from network and the value should not be
fully trusted as it is from the network. Once the value of length exceeds
the value of buflen in function smc_clc_wait_msg it may run into deadloop
when trying to drain the remaining data exceeding buflen.

This patch checks the return value of sock_recvmsg when draining data in
case of deadloop in draining.</Note>
    </Notes>
    <CVE>CVE-2024-57791</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-57791.html</URL>
        <Description>CVE-2024-57791</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235759</URL>
        <Description>SUSE Bug 1235759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235760</URL>
        <Description>SUSE Bug 1235760</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

s390/cpum_sf: Handle CPU hotplug remove during sampling

CPU hotplug remove handling triggers the following function
call sequence:

   CPUHP_AP_PERF_S390_SF_ONLINE  --&gt; s390_pmu_sf_offline_cpu()
   ...
   CPUHP_AP_PERF_ONLINE          --&gt; perf_event_exit_cpu()

The s390 CPUMF sampling CPU hotplug handler invokes:

 s390_pmu_sf_offline_cpu()
 +--&gt;  cpusf_pmu_setup()
       +--&gt; setup_pmc_cpu()
            +--&gt; deallocate_buffers()

This function de-allocates all sampling data buffers (SDBs) allocated
for that CPU at event initialization. It also clears the
PMU_F_RESERVED bit. The CPU is gone and can not be sampled.

With the event still being active on the removed CPU, the CPU event
hotplug support in kernel performance subsystem triggers the
following function calls on the removed CPU:

  perf_event_exit_cpu()
  +--&gt; perf_event_exit_cpu_context()
       +--&gt; __perf_event_exit_context()
	    +--&gt; __perf_remove_from_context()
	         +--&gt; event_sched_out()
	              +--&gt; cpumsf_pmu_del()
	                   +--&gt; cpumsf_pmu_stop()
                                +--&gt; hw_perf_event_update()

to stop and remove the event. During removal of the event, the
sampling device driver tries to read out the remaining samples from
the sample data buffers (SDBs). But they have already been freed
(and may have been re-assigned). This may lead to a use after free
situation in which case the samples are most likely invalid. In the
best case the memory has not been reassigned and still contains
valid data.

Remedy this situation and check if the CPU is still in reserved
state (bit PMU_F_RESERVED set). In this case the SDBs have not been
released an contain valid data. This is always the case when
the event is removed (and no CPU hotplug off occured).
If the PMU_F_RESERVED bit is not set, the SDB buffers are gone.</Note>
    </Notes>
    <CVE>CVE-2024-57849</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-57849.html</URL>
        <Description>CVE-2024-57849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235814</URL>
        <Description>SUSE Bug 1235814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235815</URL>
        <Description>SUSE Bug 1235815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm: adv7511: Fix use-after-free in adv7533_attach_dsi()

The host_node pointer was assigned and freed in adv7533_parse_dt(), and
later, adv7533_attach_dsi() uses the same. Fix this use-after-free issue
by  dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()
in error path of probe() and also in the remove().</Note>
    </Notes>
    <CVE>CVE-2024-57887</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-57887.html</URL>
        <Description>CVE-2024-57887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235952</URL>
        <Description>SUSE Bug 1235952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker

After commit
746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
amdgpu started seeing the following warning:

 [ ] workqueue: WQ_MEM_RECLAIM sdma0:drm_sched_run_job_work [gpu_sched] is flushing !WQ_MEM_RECLAIM events:amdgpu_device_delay_enable_gfx_off [amdgpu]
...
 [ ] Workqueue: sdma0 drm_sched_run_job_work [gpu_sched]
...
 [ ] Call Trace:
 [ ]  &lt;TASK&gt;
...
 [ ]  ? check_flush_dependency+0xf5/0x110
...
 [ ]  cancel_delayed_work_sync+0x6e/0x80
 [ ]  amdgpu_gfx_off_ctrl+0xab/0x140 [amdgpu]
 [ ]  amdgpu_ring_alloc+0x40/0x50 [amdgpu]
 [ ]  amdgpu_ib_schedule+0xf4/0x810 [amdgpu]
 [ ]  ? drm_sched_run_job_work+0x22c/0x430 [gpu_sched]
 [ ]  amdgpu_job_run+0xaa/0x1f0 [amdgpu]
 [ ]  drm_sched_run_job_work+0x257/0x430 [gpu_sched]
 [ ]  process_one_work+0x217/0x720
...
 [ ]  &lt;/TASK&gt;

The intent of the verifcation done in check_flush_depedency is to ensure
forward progress during memory reclaim, by flagging cases when either a
memory reclaim process, or a memory reclaim work item is flushed from a
context not marked as memory reclaim safe.

This is correct when flushing, but when called from the
cancel(_delayed)_work_sync() paths it is a false positive because work is
either already running, or will not be running at all. Therefore
cancelling it is safe and we can relax the warning criteria by letting the
helper know of the calling context.

References: 746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")</Note>
    </Notes>
    <CVE>CVE-2024-57888</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-57888.html</URL>
        <Description>CVE-2024-57888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235918</URL>
        <Description>SUSE Bug 1235918</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv

When mounting ocfs2 and then remounting it as read-only, a
slab-use-after-free occurs after the user uses a syscall to
quota_getnextquota.  Specifically, sb_dqinfo(sb, type)-&gt;dqi_priv is the
dangling pointer.

During the remounting process, the pointer dqi_priv is freed but is never
set as null leaving it to be accessed.  Additionally, the read-only option
for remounting sets the DQUOT_SUSPENDED flag instead of setting the
DQUOT_USAGE_ENABLED flags.  Moreover, later in the process of getting the
next quota, the function ocfs2_get_next_id is called and only checks the
quota usage flags and not the quota suspended flags.

To fix this, I set dqi_priv to null when it is freed after remounting with
read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id.

[akpm@linux-foundation.org: coding-style cleanups]</Note>
    </Notes>
    <CVE>CVE-2024-57892</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-57892.html</URL>
        <Description>CVE-2024-57892</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235964</URL>
        <Description>SUSE Bug 1235964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: seq: oss: Fix races at processing SysEx messages

OSS sequencer handles the SysEx messages split in 6 bytes packets, and
ALSA sequencer OSS layer tries to combine those.  It stores the data
in the internal buffer and this access is racy as of now, which may
lead to the out-of-bounds access.

As a temporary band-aid fix, introduce a mutex for serializing the
process of the SysEx message packets.</Note>
    </Notes>
    <CVE>CVE-2024-57893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-57893.html</URL>
        <Description>CVE-2024-57893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235920</URL>
        <Description>SUSE Bug 1235920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235921</URL>
        <Description>SUSE Bug 1235921</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.</Note>
    </Notes>
    <CVE>CVE-2024-8805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-8805.html</URL>
        <Description>CVE-2024-8805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230697</URL>
        <Description>SUSE Bug 1230697</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
