<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:1663-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-05-15T19:08:39Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-05-15T19:08:39Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-05-15T19:08:39Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 15 SP5 Real Time kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).
- CVE-2024-267600: Fixed scsi/target/pscsi error case in bio_put() (bsc#1222596).
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).
- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).
- CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609).
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).
- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).
- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).
- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).
- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).
- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).
- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).
- CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-&gt;mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth &gt; 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).

The following non-security bugs were fixed:

- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev-&gt;devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -&gt;running (stable-fixes).
- Input: allocate keycode for Display refresh rate toggle (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- PCI/AER: Block runtime suspend when handling errors (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).
- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).
- PCI: Drop pci_device_remove() test of pci_dev-&gt;driver (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
- README.BRANCH: Correct email address for Petr Tesarik
- README.BRANCH: Remove copy of branch name
- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).
- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).
- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).
- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275)
- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).
- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove dead references to cache_readaheads (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c-&gt;root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: bset: Fix comment typos (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).
- bcache: fix error info in register_bcache() (git-fixes).
- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c-&gt;root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).
- bcache: move uapi header bcache.h to bcache code directory (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).
- bcache: remove the cache_dev_name field from struct cache (git-fixes).
- bcache: remove unnecessary flush_workqueue (git-fixes).
- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).
- bcache: use bvec_kmap_local in bio_csum (git-fixes).
- bcache: use default_groups in kobj_type (git-fixes).
- bcache:: fix repeated words in comments (git-fixes).
- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).
- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: fix out-of-range warning (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix false positive for requeue needed during reshape (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm zoned: free dmz-&gt;ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-raid: fix lockdep waring in 'pers-&gt;hot_add_disk' (git-fixes).
- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: call the resume method on internal suspend (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane-&gt;state-&gt;fb == state-&gt;fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fix build warning
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).
- iommu/amd: Do not block updates to GATag if guest mode is on (git-fixes).
- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).
- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).
- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).
- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).
- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).
- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982 (git-fixes).
- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).
- iommu/iova: Fix alloc iova overflows issue (git-fixes).
- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).
- iommu/rockchip: Fix unwind goto issue (git-fixes).
- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).
- iommu/vt-d: Allocate local memory for page request queue (git-fixes).
- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).
- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).
- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- kABI: Adjust trace_iterator.wait_index (git-fixes).
- kprobes: Fix double free of kretprobe_holder (bsc#1220901).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- md/raid1: fix choose next idle in read_balance() (git-fixes).
- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).
- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- nd_btt: Make BTT lanes preemptible (git-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb-&gt;truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).
- pci_iounmap(): Fix MMIO mapping leak (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
- ring-buffer: Fix full_waiters_pending in poll (git-fixes).
- ring-buffer: Fix resetting of shortest_full (git-fixes).
- ring-buffer: Fix waking up ring buffer readers (git-fixes).
- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer-&gt;commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
- tracing: Remove precision vsnprintf() check from print event (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- vdpa/mlx5: Allow CVQ size changes (git-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- x86/xen: Add some null pointer checking to smp.c (git-fixes).
- x86/xen: add CPU dependencies for 32-bit build (git-fixes).
- x86/xen: fix percpu vcpu_info allocation (git-fixes).
- xen-netback: properly sync TX responses (git-fixes).
- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).
- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sle-micro/rt-5.5:latest-2024-1663,SUSE-2024-1663,SUSE-SLE-Micro-5.5-2024-1663,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1663,SUSE-SLE-Module-RT-15-SP5-2024-1663,openSUSE-SLE-15.5-2024-1663</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      <Description>Link for SUSE-SU-2024:1663-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:1663-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1141539</URL>
      <Description>SUSE Bug 1141539</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177529</URL>
      <Description>SUSE Bug 1177529</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190576</URL>
      <Description>SUSE Bug 1190576</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1192145</URL>
      <Description>SUSE Bug 1192145</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1192837</URL>
      <Description>SUSE Bug 1192837</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193629</URL>
      <Description>SUSE Bug 1193629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196869</URL>
      <Description>SUSE Bug 1196869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1200313</URL>
      <Description>SUSE Bug 1200313</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201308</URL>
      <Description>SUSE Bug 1201308</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201489</URL>
      <Description>SUSE Bug 1201489</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203906</URL>
      <Description>SUSE Bug 1203906</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203935</URL>
      <Description>SUSE Bug 1203935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1204614</URL>
      <Description>SUSE Bug 1204614</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207361</URL>
      <Description>SUSE Bug 1207361</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211592</URL>
      <Description>SUSE Bug 1211592</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213573</URL>
      <Description>SUSE Bug 1213573</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217408</URL>
      <Description>SUSE Bug 1217408</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218562</URL>
      <Description>SUSE Bug 1218562</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218917</URL>
      <Description>SUSE Bug 1218917</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219104</URL>
      <Description>SUSE Bug 1219104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219126</URL>
      <Description>SUSE Bug 1219126</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219141</URL>
      <Description>SUSE Bug 1219141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219169</URL>
      <Description>SUSE Bug 1219169</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219170</URL>
      <Description>SUSE Bug 1219170</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219264</URL>
      <Description>SUSE Bug 1219264</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220342</URL>
      <Description>SUSE Bug 1220342</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220492</URL>
      <Description>SUSE Bug 1220492</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220569</URL>
      <Description>SUSE Bug 1220569</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220761</URL>
      <Description>SUSE Bug 1220761</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220901</URL>
      <Description>SUSE Bug 1220901</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220915</URL>
      <Description>SUSE Bug 1220915</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220935</URL>
      <Description>SUSE Bug 1220935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221042</URL>
      <Description>SUSE Bug 1221042</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221044</URL>
      <Description>SUSE Bug 1221044</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221080</URL>
      <Description>SUSE Bug 1221080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221084</URL>
      <Description>SUSE Bug 1221084</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221088</URL>
      <Description>SUSE Bug 1221088</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221162</URL>
      <Description>SUSE Bug 1221162</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221299</URL>
      <Description>SUSE Bug 1221299</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221612</URL>
      <Description>SUSE Bug 1221612</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221617</URL>
      <Description>SUSE Bug 1221617</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221645</URL>
      <Description>SUSE Bug 1221645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221791</URL>
      <Description>SUSE Bug 1221791</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221825</URL>
      <Description>SUSE Bug 1221825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222011</URL>
      <Description>SUSE Bug 1222011</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222051</URL>
      <Description>SUSE Bug 1222051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222247</URL>
      <Description>SUSE Bug 1222247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222266</URL>
      <Description>SUSE Bug 1222266</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222294</URL>
      <Description>SUSE Bug 1222294</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222307</URL>
      <Description>SUSE Bug 1222307</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222357</URL>
      <Description>SUSE Bug 1222357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222368</URL>
      <Description>SUSE Bug 1222368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222379</URL>
      <Description>SUSE Bug 1222379</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222416</URL>
      <Description>SUSE Bug 1222416</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222422</URL>
      <Description>SUSE Bug 1222422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222424</URL>
      <Description>SUSE Bug 1222424</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222427</URL>
      <Description>SUSE Bug 1222427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222428</URL>
      <Description>SUSE Bug 1222428</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222430</URL>
      <Description>SUSE Bug 1222430</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222431</URL>
      <Description>SUSE Bug 1222431</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222435</URL>
      <Description>SUSE Bug 1222435</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222437</URL>
      <Description>SUSE Bug 1222437</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222445</URL>
      <Description>SUSE Bug 1222445</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222449</URL>
      <Description>SUSE Bug 1222449</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222482</URL>
      <Description>SUSE Bug 1222482</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222503</URL>
      <Description>SUSE Bug 1222503</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222520</URL>
      <Description>SUSE Bug 1222520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222536</URL>
      <Description>SUSE Bug 1222536</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222549</URL>
      <Description>SUSE Bug 1222549</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222550</URL>
      <Description>SUSE Bug 1222550</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222557</URL>
      <Description>SUSE Bug 1222557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222559</URL>
      <Description>SUSE Bug 1222559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222585</URL>
      <Description>SUSE Bug 1222585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222586</URL>
      <Description>SUSE Bug 1222586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222596</URL>
      <Description>SUSE Bug 1222596</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222609</URL>
      <Description>SUSE Bug 1222609</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222610</URL>
      <Description>SUSE Bug 1222610</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222613</URL>
      <Description>SUSE Bug 1222613</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222615</URL>
      <Description>SUSE Bug 1222615</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222618</URL>
      <Description>SUSE Bug 1222618</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222624</URL>
      <Description>SUSE Bug 1222624</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222630</URL>
      <Description>SUSE Bug 1222630</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222632</URL>
      <Description>SUSE Bug 1222632</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222660</URL>
      <Description>SUSE Bug 1222660</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222662</URL>
      <Description>SUSE Bug 1222662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222664</URL>
      <Description>SUSE Bug 1222664</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222666</URL>
      <Description>SUSE Bug 1222666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222669</URL>
      <Description>SUSE Bug 1222669</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222671</URL>
      <Description>SUSE Bug 1222671</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222677</URL>
      <Description>SUSE Bug 1222677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222678</URL>
      <Description>SUSE Bug 1222678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222680</URL>
      <Description>SUSE Bug 1222680</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222703</URL>
      <Description>SUSE Bug 1222703</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222704</URL>
      <Description>SUSE Bug 1222704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222706</URL>
      <Description>SUSE Bug 1222706</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222709</URL>
      <Description>SUSE Bug 1222709</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222710</URL>
      <Description>SUSE Bug 1222710</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222720</URL>
      <Description>SUSE Bug 1222720</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222721</URL>
      <Description>SUSE Bug 1222721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222724</URL>
      <Description>SUSE Bug 1222724</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222726</URL>
      <Description>SUSE Bug 1222726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222727</URL>
      <Description>SUSE Bug 1222727</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222764</URL>
      <Description>SUSE Bug 1222764</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222772</URL>
      <Description>SUSE Bug 1222772</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222773</URL>
      <Description>SUSE Bug 1222773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222776</URL>
      <Description>SUSE Bug 1222776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222781</URL>
      <Description>SUSE Bug 1222781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222784</URL>
      <Description>SUSE Bug 1222784</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222785</URL>
      <Description>SUSE Bug 1222785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222787</URL>
      <Description>SUSE Bug 1222787</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222790</URL>
      <Description>SUSE Bug 1222790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222791</URL>
      <Description>SUSE Bug 1222791</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222792</URL>
      <Description>SUSE Bug 1222792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222796</URL>
      <Description>SUSE Bug 1222796</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222798</URL>
      <Description>SUSE Bug 1222798</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222801</URL>
      <Description>SUSE Bug 1222801</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222812</URL>
      <Description>SUSE Bug 1222812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222824</URL>
      <Description>SUSE Bug 1222824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222829</URL>
      <Description>SUSE Bug 1222829</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222832</URL>
      <Description>SUSE Bug 1222832</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222836</URL>
      <Description>SUSE Bug 1222836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222838</URL>
      <Description>SUSE Bug 1222838</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222866</URL>
      <Description>SUSE Bug 1222866</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222867</URL>
      <Description>SUSE Bug 1222867</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222869</URL>
      <Description>SUSE Bug 1222869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222876</URL>
      <Description>SUSE Bug 1222876</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222878</URL>
      <Description>SUSE Bug 1222878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222879</URL>
      <Description>SUSE Bug 1222879</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222881</URL>
      <Description>SUSE Bug 1222881</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222883</URL>
      <Description>SUSE Bug 1222883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222888</URL>
      <Description>SUSE Bug 1222888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222894</URL>
      <Description>SUSE Bug 1222894</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222901</URL>
      <Description>SUSE Bug 1222901</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222968</URL>
      <Description>SUSE Bug 1222968</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223012</URL>
      <Description>SUSE Bug 1223012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223014</URL>
      <Description>SUSE Bug 1223014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223016</URL>
      <Description>SUSE Bug 1223016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223024</URL>
      <Description>SUSE Bug 1223024</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223030</URL>
      <Description>SUSE Bug 1223030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223033</URL>
      <Description>SUSE Bug 1223033</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223034</URL>
      <Description>SUSE Bug 1223034</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223035</URL>
      <Description>SUSE Bug 1223035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223036</URL>
      <Description>SUSE Bug 1223036</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223037</URL>
      <Description>SUSE Bug 1223037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223041</URL>
      <Description>SUSE Bug 1223041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223042</URL>
      <Description>SUSE Bug 1223042</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223051</URL>
      <Description>SUSE Bug 1223051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223052</URL>
      <Description>SUSE Bug 1223052</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223056</URL>
      <Description>SUSE Bug 1223056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223057</URL>
      <Description>SUSE Bug 1223057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223058</URL>
      <Description>SUSE Bug 1223058</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223060</URL>
      <Description>SUSE Bug 1223060</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223061</URL>
      <Description>SUSE Bug 1223061</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223065</URL>
      <Description>SUSE Bug 1223065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223066</URL>
      <Description>SUSE Bug 1223066</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223067</URL>
      <Description>SUSE Bug 1223067</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223068</URL>
      <Description>SUSE Bug 1223068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223076</URL>
      <Description>SUSE Bug 1223076</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223078</URL>
      <Description>SUSE Bug 1223078</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223111</URL>
      <Description>SUSE Bug 1223111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223115</URL>
      <Description>SUSE Bug 1223115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223118</URL>
      <Description>SUSE Bug 1223118</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223187</URL>
      <Description>SUSE Bug 1223187</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223189</URL>
      <Description>SUSE Bug 1223189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223190</URL>
      <Description>SUSE Bug 1223190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223191</URL>
      <Description>SUSE Bug 1223191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223196</URL>
      <Description>SUSE Bug 1223196</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223197</URL>
      <Description>SUSE Bug 1223197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223198</URL>
      <Description>SUSE Bug 1223198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223275</URL>
      <Description>SUSE Bug 1223275</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223323</URL>
      <Description>SUSE Bug 1223323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223369</URL>
      <Description>SUSE Bug 1223369</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223380</URL>
      <Description>SUSE Bug 1223380</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223473</URL>
      <Description>SUSE Bug 1223473</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223474</URL>
      <Description>SUSE Bug 1223474</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223475</URL>
      <Description>SUSE Bug 1223475</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223477</URL>
      <Description>SUSE Bug 1223477</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223478</URL>
      <Description>SUSE Bug 1223478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223479</URL>
      <Description>SUSE Bug 1223479</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223481</URL>
      <Description>SUSE Bug 1223481</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223482</URL>
      <Description>SUSE Bug 1223482</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223484</URL>
      <Description>SUSE Bug 1223484</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223487</URL>
      <Description>SUSE Bug 1223487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223490</URL>
      <Description>SUSE Bug 1223490</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223496</URL>
      <Description>SUSE Bug 1223496</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223498</URL>
      <Description>SUSE Bug 1223498</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223499</URL>
      <Description>SUSE Bug 1223499</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223501</URL>
      <Description>SUSE Bug 1223501</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223502</URL>
      <Description>SUSE Bug 1223502</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223503</URL>
      <Description>SUSE Bug 1223503</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223505</URL>
      <Description>SUSE Bug 1223505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223509</URL>
      <Description>SUSE Bug 1223509</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223511</URL>
      <Description>SUSE Bug 1223511</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223512</URL>
      <Description>SUSE Bug 1223512</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223513</URL>
      <Description>SUSE Bug 1223513</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223516</URL>
      <Description>SUSE Bug 1223516</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223517</URL>
      <Description>SUSE Bug 1223517</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223518</URL>
      <Description>SUSE Bug 1223518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223519</URL>
      <Description>SUSE Bug 1223519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223520</URL>
      <Description>SUSE Bug 1223520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223522</URL>
      <Description>SUSE Bug 1223522</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223523</URL>
      <Description>SUSE Bug 1223523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223525</URL>
      <Description>SUSE Bug 1223525</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223536</URL>
      <Description>SUSE Bug 1223536</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223539</URL>
      <Description>SUSE Bug 1223539</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223574</URL>
      <Description>SUSE Bug 1223574</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223595</URL>
      <Description>SUSE Bug 1223595</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223598</URL>
      <Description>SUSE Bug 1223598</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223634</URL>
      <Description>SUSE Bug 1223634</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223640</URL>
      <Description>SUSE Bug 1223640</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223643</URL>
      <Description>SUSE Bug 1223643</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223644</URL>
      <Description>SUSE Bug 1223644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223645</URL>
      <Description>SUSE Bug 1223645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223646</URL>
      <Description>SUSE Bug 1223646</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223648</URL>
      <Description>SUSE Bug 1223648</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223655</URL>
      <Description>SUSE Bug 1223655</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223657</URL>
      <Description>SUSE Bug 1223657</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223660</URL>
      <Description>SUSE Bug 1223660</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223661</URL>
      <Description>SUSE Bug 1223661</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223663</URL>
      <Description>SUSE Bug 1223663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223664</URL>
      <Description>SUSE Bug 1223664</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223668</URL>
      <Description>SUSE Bug 1223668</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223686</URL>
      <Description>SUSE Bug 1223686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223693</URL>
      <Description>SUSE Bug 1223693</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223705</URL>
      <Description>SUSE Bug 1223705</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223714</URL>
      <Description>SUSE Bug 1223714</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223735</URL>
      <Description>SUSE Bug 1223735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223745</URL>
      <Description>SUSE Bug 1223745</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223784</URL>
      <Description>SUSE Bug 1223784</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223785</URL>
      <Description>SUSE Bug 1223785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223790</URL>
      <Description>SUSE Bug 1223790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223816</URL>
      <Description>SUSE Bug 1223816</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223821</URL>
      <Description>SUSE Bug 1223821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223822</URL>
      <Description>SUSE Bug 1223822</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223824</URL>
      <Description>SUSE Bug 1223824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223827</URL>
      <Description>SUSE Bug 1223827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223834</URL>
      <Description>SUSE Bug 1223834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223875</URL>
      <Description>SUSE Bug 1223875</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223876</URL>
      <Description>SUSE Bug 1223876</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223877</URL>
      <Description>SUSE Bug 1223877</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223878</URL>
      <Description>SUSE Bug 1223878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223879</URL>
      <Description>SUSE Bug 1223879</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223894</URL>
      <Description>SUSE Bug 1223894</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223921</URL>
      <Description>SUSE Bug 1223921</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223922</URL>
      <Description>SUSE Bug 1223922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223923</URL>
      <Description>SUSE Bug 1223923</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223924</URL>
      <Description>SUSE Bug 1223924</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223929</URL>
      <Description>SUSE Bug 1223929</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223931</URL>
      <Description>SUSE Bug 1223931</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223932</URL>
      <Description>SUSE Bug 1223932</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223934</URL>
      <Description>SUSE Bug 1223934</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223941</URL>
      <Description>SUSE Bug 1223941</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223948</URL>
      <Description>SUSE Bug 1223948</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223949</URL>
      <Description>SUSE Bug 1223949</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223950</URL>
      <Description>SUSE Bug 1223950</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223951</URL>
      <Description>SUSE Bug 1223951</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223952</URL>
      <Description>SUSE Bug 1223952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223953</URL>
      <Description>SUSE Bug 1223953</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223956</URL>
      <Description>SUSE Bug 1223956</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223957</URL>
      <Description>SUSE Bug 1223957</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223960</URL>
      <Description>SUSE Bug 1223960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223962</URL>
      <Description>SUSE Bug 1223962</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223963</URL>
      <Description>SUSE Bug 1223963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223964</URL>
      <Description>SUSE Bug 1223964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47047/</URL>
      <Description>SUSE CVE CVE-2021-47047 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47181/</URL>
      <Description>SUSE CVE CVE-2021-47181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47182/</URL>
      <Description>SUSE CVE CVE-2021-47182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47183/</URL>
      <Description>SUSE CVE CVE-2021-47183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47184/</URL>
      <Description>SUSE CVE CVE-2021-47184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47185/</URL>
      <Description>SUSE CVE CVE-2021-47185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47187/</URL>
      <Description>SUSE CVE CVE-2021-47187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47188/</URL>
      <Description>SUSE CVE CVE-2021-47188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47189/</URL>
      <Description>SUSE CVE CVE-2021-47189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47191/</URL>
      <Description>SUSE CVE CVE-2021-47191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47192/</URL>
      <Description>SUSE CVE CVE-2021-47192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47193/</URL>
      <Description>SUSE CVE CVE-2021-47193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47194/</URL>
      <Description>SUSE CVE CVE-2021-47194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47195/</URL>
      <Description>SUSE CVE CVE-2021-47195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47196/</URL>
      <Description>SUSE CVE CVE-2021-47196 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47197/</URL>
      <Description>SUSE CVE CVE-2021-47197 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47198/</URL>
      <Description>SUSE CVE CVE-2021-47198 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47199/</URL>
      <Description>SUSE CVE CVE-2021-47199 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47200/</URL>
      <Description>SUSE CVE CVE-2021-47200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47201/</URL>
      <Description>SUSE CVE CVE-2021-47201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47202/</URL>
      <Description>SUSE CVE CVE-2021-47202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47203/</URL>
      <Description>SUSE CVE CVE-2021-47203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47204/</URL>
      <Description>SUSE CVE CVE-2021-47204 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47205/</URL>
      <Description>SUSE CVE CVE-2021-47205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47206/</URL>
      <Description>SUSE CVE CVE-2021-47206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47207/</URL>
      <Description>SUSE CVE CVE-2021-47207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47209/</URL>
      <Description>SUSE CVE CVE-2021-47209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47210/</URL>
      <Description>SUSE CVE CVE-2021-47210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47211/</URL>
      <Description>SUSE CVE CVE-2021-47211 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47212/</URL>
      <Description>SUSE CVE CVE-2021-47212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47214/</URL>
      <Description>SUSE CVE CVE-2021-47214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47215/</URL>
      <Description>SUSE CVE CVE-2021-47215 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47216/</URL>
      <Description>SUSE CVE CVE-2021-47216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47217/</URL>
      <Description>SUSE CVE CVE-2021-47217 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47218/</URL>
      <Description>SUSE CVE CVE-2021-47218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47219/</URL>
      <Description>SUSE CVE CVE-2021-47219 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48631/</URL>
      <Description>SUSE CVE CVE-2022-48631 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48632/</URL>
      <Description>SUSE CVE CVE-2022-48632 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48634/</URL>
      <Description>SUSE CVE CVE-2022-48634 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48636/</URL>
      <Description>SUSE CVE CVE-2022-48636 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48637/</URL>
      <Description>SUSE CVE CVE-2022-48637 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48638/</URL>
      <Description>SUSE CVE CVE-2022-48638 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48639/</URL>
      <Description>SUSE CVE CVE-2022-48639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48640/</URL>
      <Description>SUSE CVE CVE-2022-48640 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48642/</URL>
      <Description>SUSE CVE CVE-2022-48642 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48644/</URL>
      <Description>SUSE CVE CVE-2022-48644 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48646/</URL>
      <Description>SUSE CVE CVE-2022-48646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48647/</URL>
      <Description>SUSE CVE CVE-2022-48647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48648/</URL>
      <Description>SUSE CVE CVE-2022-48648 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48650/</URL>
      <Description>SUSE CVE CVE-2022-48650 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48651/</URL>
      <Description>SUSE CVE CVE-2022-48651 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48652/</URL>
      <Description>SUSE CVE CVE-2022-48652 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48653/</URL>
      <Description>SUSE CVE CVE-2022-48653 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48654/</URL>
      <Description>SUSE CVE CVE-2022-48654 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48655/</URL>
      <Description>SUSE CVE CVE-2022-48655 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48656/</URL>
      <Description>SUSE CVE CVE-2022-48656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48657/</URL>
      <Description>SUSE CVE CVE-2022-48657 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48658/</URL>
      <Description>SUSE CVE CVE-2022-48658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48659/</URL>
      <Description>SUSE CVE CVE-2022-48659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48660/</URL>
      <Description>SUSE CVE CVE-2022-48660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48662/</URL>
      <Description>SUSE CVE CVE-2022-48662 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48663/</URL>
      <Description>SUSE CVE CVE-2022-48663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48667/</URL>
      <Description>SUSE CVE CVE-2022-48667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48668/</URL>
      <Description>SUSE CVE CVE-2022-48668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48671/</URL>
      <Description>SUSE CVE CVE-2022-48671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48672/</URL>
      <Description>SUSE CVE CVE-2022-48672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48673/</URL>
      <Description>SUSE CVE CVE-2022-48673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48675/</URL>
      <Description>SUSE CVE CVE-2022-48675 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48686/</URL>
      <Description>SUSE CVE CVE-2022-48686 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48687/</URL>
      <Description>SUSE CVE CVE-2022-48687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48688/</URL>
      <Description>SUSE CVE CVE-2022-48688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48690/</URL>
      <Description>SUSE CVE CVE-2022-48690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48692/</URL>
      <Description>SUSE CVE CVE-2022-48692 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48693/</URL>
      <Description>SUSE CVE CVE-2022-48693 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48694/</URL>
      <Description>SUSE CVE CVE-2022-48694 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48695/</URL>
      <Description>SUSE CVE CVE-2022-48695 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48697/</URL>
      <Description>SUSE CVE CVE-2022-48697 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48698/</URL>
      <Description>SUSE CVE CVE-2022-48698 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48700/</URL>
      <Description>SUSE CVE CVE-2022-48700 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48701/</URL>
      <Description>SUSE CVE CVE-2022-48701 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48702/</URL>
      <Description>SUSE CVE CVE-2022-48702 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48703/</URL>
      <Description>SUSE CVE CVE-2022-48703 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48704/</URL>
      <Description>SUSE CVE CVE-2022-48704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2860/</URL>
      <Description>SUSE CVE CVE-2023-2860 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52488/</URL>
      <Description>SUSE CVE CVE-2023-52488 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52503/</URL>
      <Description>SUSE CVE CVE-2023-52503 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52561/</URL>
      <Description>SUSE CVE CVE-2023-52561 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52585/</URL>
      <Description>SUSE CVE CVE-2023-52585 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52589/</URL>
      <Description>SUSE CVE CVE-2023-52589 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52590/</URL>
      <Description>SUSE CVE CVE-2023-52590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52591/</URL>
      <Description>SUSE CVE CVE-2023-52591 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52593/</URL>
      <Description>SUSE CVE CVE-2023-52593 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52614/</URL>
      <Description>SUSE CVE CVE-2023-52614 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52616/</URL>
      <Description>SUSE CVE CVE-2023-52616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52620/</URL>
      <Description>SUSE CVE CVE-2023-52620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52627/</URL>
      <Description>SUSE CVE CVE-2023-52627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52635/</URL>
      <Description>SUSE CVE CVE-2023-52635 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52636/</URL>
      <Description>SUSE CVE CVE-2023-52636 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52645/</URL>
      <Description>SUSE CVE CVE-2023-52645 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52652/</URL>
      <Description>SUSE CVE CVE-2023-52652 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-6270/</URL>
      <Description>SUSE CVE CVE-2023-6270 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0639/</URL>
      <Description>SUSE CVE CVE-2024-0639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0841/</URL>
      <Description>SUSE CVE CVE-2024-0841 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22099/</URL>
      <Description>SUSE CVE CVE-2024-22099 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-23307/</URL>
      <Description>SUSE CVE CVE-2024-23307 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-23848/</URL>
      <Description>SUSE CVE CVE-2024-23848 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-23850/</URL>
      <Description>SUSE CVE CVE-2024-23850 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26601/</URL>
      <Description>SUSE CVE CVE-2024-26601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26610/</URL>
      <Description>SUSE CVE CVE-2024-26610 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26656/</URL>
      <Description>SUSE CVE CVE-2024-26656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26660/</URL>
      <Description>SUSE CVE CVE-2024-26660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26671/</URL>
      <Description>SUSE CVE CVE-2024-26671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26673/</URL>
      <Description>SUSE CVE CVE-2024-26673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26675/</URL>
      <Description>SUSE CVE CVE-2024-26675 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26680/</URL>
      <Description>SUSE CVE CVE-2024-26680 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26681/</URL>
      <Description>SUSE CVE CVE-2024-26681 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26684/</URL>
      <Description>SUSE CVE CVE-2024-26684 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26685/</URL>
      <Description>SUSE CVE CVE-2024-26685 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26687/</URL>
      <Description>SUSE CVE CVE-2024-26687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26688/</URL>
      <Description>SUSE CVE CVE-2024-26688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26689/</URL>
      <Description>SUSE CVE CVE-2024-26689 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26696/</URL>
      <Description>SUSE CVE CVE-2024-26696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26697/</URL>
      <Description>SUSE CVE CVE-2024-26697 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26702/</URL>
      <Description>SUSE CVE CVE-2024-26702 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26704/</URL>
      <Description>SUSE CVE CVE-2024-26704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26718/</URL>
      <Description>SUSE CVE CVE-2024-26718 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26722/</URL>
      <Description>SUSE CVE CVE-2024-26722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26727/</URL>
      <Description>SUSE CVE CVE-2024-26727 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26733/</URL>
      <Description>SUSE CVE CVE-2024-26733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26736/</URL>
      <Description>SUSE CVE CVE-2024-26736 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26737/</URL>
      <Description>SUSE CVE CVE-2024-26737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26739/</URL>
      <Description>SUSE CVE CVE-2024-26739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26743/</URL>
      <Description>SUSE CVE CVE-2024-26743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26744/</URL>
      <Description>SUSE CVE CVE-2024-26744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26745/</URL>
      <Description>SUSE CVE CVE-2024-26745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26747/</URL>
      <Description>SUSE CVE CVE-2024-26747 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26749/</URL>
      <Description>SUSE CVE CVE-2024-26749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26751/</URL>
      <Description>SUSE CVE CVE-2024-26751 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26754/</URL>
      <Description>SUSE CVE CVE-2024-26754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26760/</URL>
      <Description>SUSE CVE CVE-2024-26760 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-267600/</URL>
      <Description>SUSE CVE CVE-2024-267600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26763/</URL>
      <Description>SUSE CVE CVE-2024-26763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26764/</URL>
      <Description>SUSE CVE CVE-2024-26764 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26766/</URL>
      <Description>SUSE CVE CVE-2024-26766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26769/</URL>
      <Description>SUSE CVE CVE-2024-26769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26771/</URL>
      <Description>SUSE CVE CVE-2024-26771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26772/</URL>
      <Description>SUSE CVE CVE-2024-26772 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26773/</URL>
      <Description>SUSE CVE CVE-2024-26773 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26776/</URL>
      <Description>SUSE CVE CVE-2024-26776 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26779/</URL>
      <Description>SUSE CVE CVE-2024-26779 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26783/</URL>
      <Description>SUSE CVE CVE-2024-26783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26787/</URL>
      <Description>SUSE CVE CVE-2024-26787 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26790/</URL>
      <Description>SUSE CVE CVE-2024-26790 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26792/</URL>
      <Description>SUSE CVE CVE-2024-26792 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26793/</URL>
      <Description>SUSE CVE CVE-2024-26793 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26798/</URL>
      <Description>SUSE CVE CVE-2024-26798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26805/</URL>
      <Description>SUSE CVE CVE-2024-26805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26807/</URL>
      <Description>SUSE CVE CVE-2024-26807 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26816/</URL>
      <Description>SUSE CVE CVE-2024-26816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26817/</URL>
      <Description>SUSE CVE CVE-2024-26817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26820/</URL>
      <Description>SUSE CVE CVE-2024-26820 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26825/</URL>
      <Description>SUSE CVE CVE-2024-26825 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26830/</URL>
      <Description>SUSE CVE CVE-2024-26830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26833/</URL>
      <Description>SUSE CVE CVE-2024-26833 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26836/</URL>
      <Description>SUSE CVE CVE-2024-26836 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26843/</URL>
      <Description>SUSE CVE CVE-2024-26843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26848/</URL>
      <Description>SUSE CVE CVE-2024-26848 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26852/</URL>
      <Description>SUSE CVE CVE-2024-26852 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26853/</URL>
      <Description>SUSE CVE CVE-2024-26853 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26855/</URL>
      <Description>SUSE CVE CVE-2024-26855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26856/</URL>
      <Description>SUSE CVE CVE-2024-26856 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26857/</URL>
      <Description>SUSE CVE CVE-2024-26857 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26861/</URL>
      <Description>SUSE CVE CVE-2024-26861 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26862/</URL>
      <Description>SUSE CVE CVE-2024-26862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26866/</URL>
      <Description>SUSE CVE CVE-2024-26866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26872/</URL>
      <Description>SUSE CVE CVE-2024-26872 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26875/</URL>
      <Description>SUSE CVE CVE-2024-26875 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26878/</URL>
      <Description>SUSE CVE CVE-2024-26878 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26879/</URL>
      <Description>SUSE CVE CVE-2024-26879 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26881/</URL>
      <Description>SUSE CVE CVE-2024-26881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26882/</URL>
      <Description>SUSE CVE CVE-2024-26882 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26883/</URL>
      <Description>SUSE CVE CVE-2024-26883 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26884/</URL>
      <Description>SUSE CVE CVE-2024-26884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26885/</URL>
      <Description>SUSE CVE CVE-2024-26885 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26891/</URL>
      <Description>SUSE CVE CVE-2024-26891 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26893/</URL>
      <Description>SUSE CVE CVE-2024-26893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26895/</URL>
      <Description>SUSE CVE CVE-2024-26895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26896/</URL>
      <Description>SUSE CVE CVE-2024-26896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26897/</URL>
      <Description>SUSE CVE CVE-2024-26897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26898/</URL>
      <Description>SUSE CVE CVE-2024-26898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26901/</URL>
      <Description>SUSE CVE CVE-2024-26901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26903/</URL>
      <Description>SUSE CVE CVE-2024-26903 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26917/</URL>
      <Description>SUSE CVE CVE-2024-26917 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26927/</URL>
      <Description>SUSE CVE CVE-2024-26927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26948/</URL>
      <Description>SUSE CVE CVE-2024-26948 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26950/</URL>
      <Description>SUSE CVE CVE-2024-26950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26951/</URL>
      <Description>SUSE CVE CVE-2024-26951 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26955/</URL>
      <Description>SUSE CVE CVE-2024-26955 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26956/</URL>
      <Description>SUSE CVE CVE-2024-26956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26960/</URL>
      <Description>SUSE CVE CVE-2024-26960 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26965/</URL>
      <Description>SUSE CVE CVE-2024-26965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26966/</URL>
      <Description>SUSE CVE CVE-2024-26966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26969/</URL>
      <Description>SUSE CVE CVE-2024-26969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26970/</URL>
      <Description>SUSE CVE CVE-2024-26970 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26972/</URL>
      <Description>SUSE CVE CVE-2024-26972 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26981/</URL>
      <Description>SUSE CVE CVE-2024-26981 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26982/</URL>
      <Description>SUSE CVE CVE-2024-26982 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26993/</URL>
      <Description>SUSE CVE CVE-2024-26993 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27013/</URL>
      <Description>SUSE CVE CVE-2024-27013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27014/</URL>
      <Description>SUSE CVE CVE-2024-27014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27030/</URL>
      <Description>SUSE CVE CVE-2024-27030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27038/</URL>
      <Description>SUSE CVE CVE-2024-27038 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27039/</URL>
      <Description>SUSE CVE CVE-2024-27039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27041/</URL>
      <Description>SUSE CVE CVE-2024-27041 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27043/</URL>
      <Description>SUSE CVE CVE-2024-27043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27046/</URL>
      <Description>SUSE CVE CVE-2024-27046 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27056/</URL>
      <Description>SUSE CVE CVE-2024-27056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27062/</URL>
      <Description>SUSE CVE CVE-2024-27062 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27389/</URL>
      <Description>SUSE CVE CVE-2024-27389 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/sle-micro/rt-5.5:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/rt-5.5:latest">
        <FullProductName ProductID="Container suse/sle-micro/rt-5.5:latest">Container suse/sle-micro/rt-5.5:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP5" CPE="cpe:/o:suse:sle-module-live-patching:15:sp5">SUSE Linux Enterprise Live Patching 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.5">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5" CPE="cpe:/o:suse:sle-micro:5.5">SUSE Linux Enterprise Micro 5.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Real Time Module 15 SP5">
      <Branch Type="Product Name" Name="SUSE Real Time Module 15 SP5">
        <FullProductName ProductID="SUSE Real Time Module 15 SP5" CPE="cpe:/o:suse:sle-module-rt:15:sp5">SUSE Real Time Module 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt-5.14.21-150500.13.52.1">kernel-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="cluster-md-kmp-rt-5.14.21-150500.13.52.1">cluster-md-kmp-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="dlm-kmp-rt-5.14.21-150500.13.52.1">dlm-kmp-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="gfs2-kmp-rt-5.14.21-150500.13.52.1">gfs2-kmp-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-devel-rt-5.14.21-150500.13.52.1">kernel-devel-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1">
      <FullProductName ProductID="kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1">kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt-devel-5.14.21-150500.13.52.1">kernel-rt-devel-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt-extra-5.14.21-150500.13.52.1">kernel-rt-extra-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt-livepatch-5.14.21-150500.13.52.1">kernel-rt-livepatch-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-devel-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt-livepatch-devel-5.14.21-150500.13.52.1">kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-optional-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt-optional-5.14.21-150500.13.52.1">kernel-rt-optional-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-vdso-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt-vdso-5.14.21-150500.13.52.1">kernel-rt-vdso-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt_debug-5.14.21-150500.13.52.1">kernel-rt_debug-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt_debug-devel-5.14.21-150500.13.52.1">kernel-rt_debug-devel-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1">kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-vdso-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-rt_debug-vdso-5.14.21-150500.13.52.1">kernel-rt_debug-vdso-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-source-rt-5.14.21-150500.13.52.1">kernel-source-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kernel-syms-rt-5.14.21-150500.13.52.1">kernel-syms-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="kselftests-kmp-rt-5.14.21-150500.13.52.1">kselftests-kmp-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="ocfs2-kmp-rt-5.14.21-150500.13.52.1">ocfs2-kmp-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.14.21-150500.13.52.1">
      <FullProductName ProductID="reiserfs-kmp-rt-5.14.21-150500.13.52.1">reiserfs-kmp-rt-5.14.21-150500.13.52.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/rt-5.5:latest">
      <FullProductName ProductID="Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1">kernel-rt-5.14.21-150500.13.52.1 as a component of Container suse/sle-micro/rt-5.5:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1">kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1">kernel-rt-5.14.21-150500.13.52.1 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1">kernel-source-rt-5.14.21-150500.13.52.1 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1">cluster-md-kmp-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1">dlm-kmp-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1">gfs2-kmp-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1">kernel-devel-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1">kernel-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-devel-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1">kernel-rt-devel-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-vdso-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1">kernel-rt-vdso-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1">kernel-rt_debug-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-devel-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1">kernel-rt_debug-devel-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-vdso-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1">kernel-rt_debug-vdso-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1">kernel-source-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1">kernel-syms-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1">ocfs2-kmp-rt-5.14.21-150500.13.52.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1">cluster-md-kmp-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1">dlm-kmp-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1">gfs2-kmp-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1">kernel-devel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1">kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-devel-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1">kernel-rt-devel-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-extra-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1">kernel-rt-extra-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-livepatch-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1">kernel-rt-livepatch-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-livepatch-devel-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1">kernel-rt-livepatch-devel-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-optional-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1">kernel-rt-optional-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-vdso-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1">kernel-rt-vdso-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1">kernel-rt_debug-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-devel-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1">kernel-rt_debug-devel-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1">kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-vdso-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1">kernel-rt_debug-vdso-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1">kernel-source-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1">kernel-syms-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kselftests-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1">kselftests-kmp-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1">ocfs2-kmp-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-rt-5.14.21-150500.13.52.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1">reiserfs-kmp-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails

The spi controller supports 44-bit address space on AXI in DMA mode,
so set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.
In addition, if dma_map_single fails, it should return immediately
instead of continuing doing the DMA operation which bases on invalid
address.

This fixes the following crash which occurs in reading a big block
from flash:

[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)
[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped
[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0
[  123.792536] Mem abort info:
[  123.795313]   ESR = 0x96000145
[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits
[  123.803655]   SET = 0, FnV = 0
[  123.806693]   EA = 0, S1PTW = 0
[  123.809818] Data abort info:
[  123.812683]   ISV = 0, ISS = 0x00000145
[  123.816503]   CM = 1, WnR = 1
[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000
[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000
[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP</Note>
    </Notes>
    <CVE>CVE-2021-47047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47047.html</URL>
        <Description>CVE-2021-47047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220761</URL>
        <Description>SUSE Bug 1220761</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: musb: tusb6010: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.</Note>
    </Notes>
    <CVE>CVE-2021-47181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47181.html</URL>
        <Description>CVE-2021-47181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222660</URL>
        <Description>SUSE Bug 1222660</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix scsi_mode_sense() buffer length handling

Several problems exist with scsi_mode_sense() buffer length handling:

 1) The allocation length field of the MODE SENSE(10) command is 16-bits,
    occupying bytes 7 and 8 of the CDB. With this command, access to mode
    pages larger than 255 bytes is thus possible. However, the CDB
    allocation length field is set by assigning len to byte 8 only, thus
    truncating buffer length larger than 255.

 2) If scsi_mode_sense() is called with len smaller than 8 with
    sdev-&gt;use_10_for_ms set, or smaller than 4 otherwise, the buffer length
    is increased to 8 and 4 respectively, and the buffer is zero filled
    with these increased values, thus corrupting the memory following the
    buffer.

Fix these 2 problems by using put_unaligned_be16() to set the allocation
length field of MODE SENSE(10) CDB and by returning an error when len is
too small.

Furthermore, if len is larger than 255B, always try MODE SENSE(10) first,
even if the device driver did not set sdev-&gt;use_10_for_ms. In case of
invalid opcode error for MODE SENSE(10), access to mode pages larger than
255 bytes are not retried using MODE SENSE(6). To avoid buffer length
overflows for the MODE_SENSE(10) case, check that len is smaller than 65535
bytes.

While at it, also fix the folowing:

 * Use get_unaligned_be16() to retrieve the mode data length and block
   descriptor length fields of the mode sense reply header instead of using
   an open coded calculation.

 * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable
   Block Descriptor, which is the opposite of what the dbd argument
   description was.</Note>
    </Notes>
    <CVE>CVE-2021-47182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47182.html</URL>
        <Description>CVE-2021-47182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222662</URL>
        <Description>SUSE Bug 1222662</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix link down processing to address NULL pointer dereference

If an FC link down transition while PLOGIs are outstanding to fabric well
known addresses, outstanding ABTS requests may result in a NULL pointer
dereference. Driver unload requests may hang with repeated "2878" log
messages.

The Link down processing results in ABTS requests for outstanding ELS
requests. The Abort WQEs are sent for the ELSs before the driver had set
the link state to down. Thus the driver is sending the Abort with the
expectation that an ABTS will be sent on the wire. The Abort request is
stalled waiting for the link to come up. In some conditions the driver may
auto-complete the ELSs thus if the link does come up, the Abort completions
may reference an invalid structure.

Fix by ensuring that Abort set the flag to avoid link traffic if issued due
to conditions where the link failed.</Note>
    </Notes>
    <CVE>CVE-2021-47183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47183.html</URL>
        <Description>CVE-2021-47183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222664</URL>
        <Description>SUSE Bug 1222664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix NULL ptr dereference on VSI filter sync

Remove the reason of null pointer dereference in sync VSI filters.
Added new I40E_VSI_RELEASING flag to signalize deleting and releasing
of VSI resources to sync this thread with sync filters subtask.
Without this patch it is possible to start update the VSI filter list
after VSI is removed, that's causing a kernel oops.</Note>
    </Notes>
    <CVE>CVE-2021-47184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47184.html</URL>
        <Description>CVE-2021-47184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222666</URL>
        <Description>SUSE Bug 1222666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc

When running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,
which look like this one:

  Workqueue: events_unbound flush_to_ldisc
  Call trace:
   dump_backtrace+0x0/0x1ec
   show_stack+0x24/0x30
   dump_stack+0xd0/0x128
   panic+0x15c/0x374
   watchdog_timer_fn+0x2b8/0x304
   __run_hrtimer+0x88/0x2c0
   __hrtimer_run_queues+0xa4/0x120
   hrtimer_interrupt+0xfc/0x270
   arch_timer_handler_phys+0x40/0x50
   handle_percpu_devid_irq+0x94/0x220
   __handle_domain_irq+0x88/0xf0
   gic_handle_irq+0x84/0xfc
   el1_irq+0xc8/0x180
   slip_unesc+0x80/0x214 [slip]
   tty_ldisc_receive_buf+0x64/0x80
   tty_port_default_receive_buf+0x50/0x90
   flush_to_ldisc+0xbc/0x110
   process_one_work+0x1d4/0x4b0
   worker_thread+0x180/0x430
   kthread+0x11c/0x120

In the testcase pty04, The first process call the write syscall to send
data to the pty master. At the same time, the workqueue will do the
flush_to_ldisc to pop data in a loop until there is no more data left.
When the sender and workqueue running in different core, the sender sends
data fastly in full time which will result in workqueue doing work in loop
for a long time and occuring softlockup in flush_to_ldisc with kernel
configured without preempt. So I add need_resched check and cond_resched
in the flush_to_ldisc loop to avoid it.</Note>
    </Notes>
    <CVE>CVE-2021-47185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47185.html</URL>
        <Description>CVE-2021-47185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222669</URL>
        <Description>SUSE Bug 1222669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency

The entry/exit latency and minimum residency in state for the idle
states of MSM8998 were ..bad: first of all, for all of them the
timings were written for CPU sleep but the min-residency-us param
was miscalculated (supposedly, while porting this from downstream);
Then, the power collapse states are setting PC on both the CPU
cluster *and* the L2 cache, which have different timings: in the
specific case of L2 the times are higher so these ones should be
taken into account instead of the CPU ones.

This parameter misconfiguration was not giving particular issues
because on MSM8998 there was no CPU scaling at all, so cluster/L2
power collapse was rarely (if ever) hit.
When CPU scaling is enabled, though, the wrong timings will produce
SoC unstability shown to the user as random, apparently error-less,
sudden reboots and/or lockups.

This set of parameters are stabilizing the SoC when CPU scaling is
ON and when power collapse is frequently hit.</Note>
    </Notes>
    <CVE>CVE-2021-47187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47187.html</URL>
        <Description>CVE-2021-47187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222703</URL>
        <Description>SUSE Bug 1222703</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Improve SCSI abort handling

The following has been observed on a test setup:

WARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c
Call trace:
 ufshcd_queuecommand+0x468/0x65c
 scsi_send_eh_cmnd+0x224/0x6a0
 scsi_eh_test_devices+0x248/0x418
 scsi_eh_ready_devs+0xc34/0xe58
 scsi_error_handler+0x204/0x80c
 kthread+0x150/0x1b4
 ret_from_fork+0x10/0x30

That warning is triggered by the following statement:

	WARN_ON(lrbp-&gt;cmd);

Fix this warning by clearing lrbp-&gt;cmd from the abort handler.</Note>
    </Notes>
    <CVE>CVE-2021-47188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47188.html</URL>
        <Description>CVE-2021-47188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222671</URL>
        <Description>SUSE Bug 1222671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory ordering between normal and ordered work functions

Ordered work functions aren't guaranteed to be handled by the same thread
which executed the normal work functions. The only way execution between
normal/ordered functions is synchronized is via the WORK_DONE_BIT,
unfortunately the used bitops don't guarantee any ordering whatsoever.

This manifested as seemingly inexplicable crashes on ARM64, where
async_chunk::inode is seen as non-null in async_cow_submit which causes
submit_compressed_extents to be called and crash occurs because
async_chunk::inode suddenly became NULL. The call trace was similar to:

    pc : submit_compressed_extents+0x38/0x3d0
    lr : async_cow_submit+0x50/0xd0
    sp : ffff800015d4bc20

    &lt;registers omitted for brevity&gt;

    Call trace:
     submit_compressed_extents+0x38/0x3d0
     async_cow_submit+0x50/0xd0
     run_ordered_work+0xc8/0x280
     btrfs_work_helper+0x98/0x250
     process_one_work+0x1f0/0x4ac
     worker_thread+0x188/0x504
     kthread+0x110/0x114
     ret_from_fork+0x10/0x18

Fix this by adding respective barrier calls which ensure that all
accesses preceding setting of WORK_DONE_BIT are strictly ordered before
setting the flag. At the same time add a read barrier after reading of
WORK_DONE_BIT in run_ordered_work which ensures all subsequent loads
would be strictly ordered after reading the bit. This in turn ensures
are all accesses before WORK_DONE_BIT are going to be strictly ordered
before any access that can occur in ordered_func.</Note>
    </Notes>
    <CVE>CVE-2021-47189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47189.html</URL>
        <Description>CVE-2021-47189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222706</URL>
        <Description>SUSE Bug 1222706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()

The following warning was observed running syzkaller:

[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;
[ 3813.830724]    program syz-executor not setting count and/or reply_len properly
[ 3813.836956] ==================================================================
[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0
[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549
[ 3813.846612] Call Trace:
[ 3813.846995]  dump_stack+0x108/0x15f
[ 3813.847524]  print_address_description+0xa5/0x372
[ 3813.848243]  kasan_report.cold+0x236/0x2a8
[ 3813.849439]  check_memory_region+0x240/0x270
[ 3813.850094]  memcpy+0x30/0x80
[ 3813.850553]  sg_copy_buffer+0x157/0x1e0
[ 3813.853032]  sg_copy_from_buffer+0x13/0x20
[ 3813.853660]  fill_from_dev_buffer+0x135/0x370
[ 3813.854329]  resp_readcap16+0x1ac/0x280
[ 3813.856917]  schedule_resp+0x41f/0x1630
[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0
[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950
[ 3813.863329]  scsi_request_fn+0xd8e/0x1710
[ 3813.863946]  __blk_run_queue+0x10b/0x230
[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400
[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420
[ 3813.871637]  sg_write+0x6c8/0xef0
[ 3813.878853]  __vfs_write+0xe4/0x800
[ 3813.883487]  vfs_write+0x17b/0x530
[ 3813.884008]  ksys_write+0x103/0x270
[ 3813.886268]  __x64_sys_write+0x77/0xc0
[ 3813.886841]  do_syscall_64+0x106/0x360
[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

This issue can be reproduced with the following syzkaller log:

r0 = openat(0xffffffffffffff9c, &amp;(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &amp;(0x7f0000000000)='fd/3\x00')
open_by_handle_at(r1, &amp;(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)
r2 = syz_open_dev$sg(&amp;(0x7f0000000000), 0x0, 0x40782)
write$binfmt_aout(r2, &amp;(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126)

In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass
the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This
leads to OOB in sg_copy_buffer().

To solve this issue, define alloc_len as u32.</Note>
    </Notes>
    <CVE>CVE-2021-47191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47191.html</URL>
        <Description>CVE-2021-47191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222866</URL>
        <Description>SUSE Bug 1222866</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: core: sysfs: Fix hang when device state is set via sysfs

This fixes a regression added with:

commit f0f82e2476f6 ("scsi: core: Fix capacity set to zero after
offlinining device")

The problem is that after iSCSI recovery, iscsid will call into the kernel
to set the dev's state to running, and with that patch we now call
scsi_rescan_device() with the state_mutex held. If the SCSI error handler
thread is just starting to test the device in scsi_send_eh_cmnd() then it's
going to try to grab the state_mutex.

We are then stuck, because when scsi_rescan_device() tries to send its I/O
scsi_queue_rq() calls -&gt; scsi_host_queue_ready() -&gt; scsi_host_in_recovery()
which will return true (the host state is still in recovery) and I/O will
just be requeued. scsi_send_eh_cmnd() will then never be able to grab the
state_mutex to finish error handling.

To prevent the deadlock move the rescan-related code to after we drop the
state_mutex.

This also adds a check for if we are already in the running state. This
prevents extra scans and helps the iscsid case where if the transport class
has already onlined the device during its recovery process then we don't
need userspace to do it again plus possibly block that daemon.</Note>
    </Notes>
    <CVE>CVE-2021-47192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47192.html</URL>
        <Description>CVE-2021-47192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222867</URL>
        <Description>SUSE Bug 1222867</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Fix memory leak during rmmod

Driver failed to release all memory allocated. This would lead to memory
leak during driver removal.

Properly free memory when the module is removed.</Note>
    </Notes>
    <CVE>CVE-2021-47193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47193.html</URL>
        <Description>CVE-2021-47193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222879</URL>
        <Description>SUSE Bug 1222879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cfg80211: call cfg80211_stop_ap when switch from P2P_GO type

If the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata-&gt;assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.</Note>
    </Notes>
    <CVE>CVE-2021-47194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47194.html</URL>
        <Description>CVE-2021-47194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222829</URL>
        <Description>SUSE Bug 1222829</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

spi: fix use-after-free of the add_lock mutex

Commit 6098475d4cb4 ("spi: Fix deadlock when adding SPI controllers on
SPI buses") introduced a per-controller mutex. But mutex_unlock() of
said lock is called after the controller is already freed:

  spi_unregister_controller(ctlr)
  -&gt; put_device(&amp;ctlr-&gt;dev)
    -&gt; spi_controller_release(dev)
  -&gt; mutex_unlock(&amp;ctrl-&gt;add_lock)

Move the put_device() after the mutex_unlock().</Note>
    </Notes>
    <CVE>CVE-2021-47195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47195.html</URL>
        <Description>CVE-2021-47195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222832</URL>
        <Description>SUSE Bug 1222832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Set send and receive CQ before forwarding to the driver

Preset both receive and send CQ pointers prior to call to the drivers and
overwrite it later again till the mlx4 is going to be changed do not
overwrite ibqp properties.

This change is needed for mlx5, because in case of QP creation failure, it
will go to the path of QP destroy which relies on proper CQ pointers.

 BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]
 Write of size 8 at addr ffff8880064c55c0 by task a.out/246

 CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Call Trace:
  dump_stack_lvl+0x45/0x59
  print_address_description.constprop.0+0x1f/0x140
  kasan_report.cold+0x83/0xdf
  create_qp.cold+0x164/0x16e [mlx5_ib]
  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]
  create_qp.part.0+0x45b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Allocated by task 246:
  kasan_save_stack+0x1b/0x40
  __kasan_kmalloc+0xa4/0xd0
  create_qp.part.0+0x92/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Freed by task 246:
  kasan_save_stack+0x1b/0x40
  kasan_set_track+0x1c/0x30
  kasan_set_free_info+0x20/0x30
  __kasan_slab_free+0x10c/0x150
  slab_free_freelist_hook+0xb4/0x1b0
  kfree+0xe7/0x2a0
  create_qp.part.0+0x52b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae</Note>
    </Notes>
    <CVE>CVE-2021-47196</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47196.html</URL>
        <Description>CVE-2021-47196</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222773</URL>
        <Description>SUSE Bug 1222773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: nullify cq-&gt;dbg pointer in mlx5_debug_cq_remove()

Prior to this patch in case mlx5_core_destroy_cq() failed it proceeds
to rest of destroy operations. mlx5_core_destroy_cq() could be called again
by user and cause additional call of mlx5_debug_cq_remove().
cq-&gt;dbg was not nullify in previous call and cause the crash.

Fix it by nullify cq-&gt;dbg pointer after removal.

Also proceed to destroy operations only if FW return 0
for MLX5_CMD_OP_DESTROY_CQ command.

general protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI
CPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:lockref_get+0x1/0x60
Code: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02
00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 &lt;48&gt; 8b 17
48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48
RSP: 0018:ffff888137dd7a38 EFLAGS: 00010206
RAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe
RDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058
RBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000
R13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0
FS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0
Call Trace:
  simple_recursive_removal+0x33/0x2e0
  ? debugfs_remove+0x60/0x60
  debugfs_remove+0x40/0x60
  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]
  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]
  devx_obj_cleanup+0x151/0x330 [mlx5_ib]
  ? __pollwait+0xd0/0xd0
  ? xas_load+0x5/0x70
  ? xa_load+0x62/0xa0
  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]
  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]
  uobj_destroy+0x54/0xa0 [ib_uverbs]
  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]
  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]
  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]
  __x64_sys_ioctl+0x3e4/0x8e0</Note>
    </Notes>
    <CVE>CVE-2021-47197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47197.html</URL>
        <Description>CVE-2021-47197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222776</URL>
        <Description>SUSE Bug 1222776</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine

An error is detected with the following report when unloading the driver:
  "KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b"

The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the
flag is not cleared upon completion of the login.

This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set
to LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used
as an rpi_ids array index.

Fix by clearing the NLP_REG_LOGIN_SEND nlp_flag in
lpfc_mbx_cmpl_fc_reg_login().</Note>
    </Notes>
    <CVE>CVE-2021-47198</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47198.html</URL>
        <Description>CVE-2021-47198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222883</URL>
        <Description>SUSE Bug 1222883</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: CT, Fix multiple allocations and memleak of mod acts

CT clear action offload adds additional mod hdr actions to the
flow's original mod actions in order to clear the registers which
hold ct_state.
When such flow also includes encap action, a neigh update event
can cause the driver to unoffload the flow and then reoffload it.

Each time this happens, the ct clear handling adds that same set
of mod hdr actions to reset ct_state until the max of mod hdr
actions is reached.

Also the driver never releases the allocated mod hdr actions and
causing a memleak.

Fix above two issues by moving CT clear mod acts allocation
into the parsing actions phase and only use it when offloading the rule.
The release of mod acts will be done in the normal flow_put().

 backtrace:
    [&lt;000000007316e2f3&gt;] krealloc+0x83/0xd0
    [&lt;00000000ef157de1&gt;] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]
    [&lt;00000000970ce4ae&gt;] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]
    [&lt;0000000067c5fa17&gt;] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]
    [&lt;00000000d032eb98&gt;] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]
    [&lt;00000000fd23b869&gt;] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]
    [&lt;000000004fc24acc&gt;] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]
    [&lt;00000000dc741c17&gt;] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]
    [&lt;00000000e92e49d7&gt;] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]
    [&lt;00000000f60f5602&gt;] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]</Note>
    </Notes>
    <CVE>CVE-2021-47199</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47199.html</URL>
        <Description>CVE-2021-47199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222785</URL>
        <Description>SUSE Bug 1222785</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap

drm_gem_ttm_mmap() drops a reference to the gem object on success. If
the gem object's refcount == 1 on entry to drm_gem_prime_mmap(), that
drop will free the gem object, and the subsequent drm_gem_object_get()
will be a UAF. Fix by grabbing a reference before calling the mmap
helper.

This issue was forseen when the reference dropping was adding in
commit 9786b65bc61ac ("drm/ttm: fix mmap refcounting"):
  "For that to work properly the drm_gem_object_get() call in
  drm_gem_ttm_mmap() must be moved so it happens before calling
  obj-&gt;funcs-&gt;mmap(), otherwise the gem refcount would go down
  to zero."</Note>
    </Notes>
    <CVE>CVE-2021-47200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47200.html</URL>
        <Description>CVE-2021-47200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222838</URL>
        <Description>SUSE Bug 1222838</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iavf: free q_vectors before queues in iavf_disable_vf

iavf_free_queues() clears adapter-&gt;num_active_queues, which
iavf_free_q_vectors() relies on, so swap the order of these two function
calls in iavf_disable_vf(). This resolves a panic encountered when the
interface is disabled and then later brought up again after PF
communication is restored.</Note>
    </Notes>
    <CVE>CVE-2021-47201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47201.html</URL>
        <Description>CVE-2021-47201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222792</URL>
        <Description>SUSE Bug 1222792</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

thermal: Fix NULL pointer dereferences in of_thermal_ functions

of_parse_thermal_zones() parses the thermal-zones node and registers a
thermal_zone device for each subnode. However, if a thermal zone is
consuming a thermal sensor and that thermal sensor device hasn't probed
yet, an attempt to set trip_point_*_temp for that thermal zone device
can cause a NULL pointer dereference. Fix it.

 console:/sys/class/thermal/thermal_zone87 # echo 120000 &gt; trip_point_0_temp
 ...
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
 ...
 Call trace:
  of_thermal_set_trip_temp+0x40/0xc4
  trip_point_temp_store+0xc0/0x1dc
  dev_attr_store+0x38/0x88
  sysfs_kf_write+0x64/0xc0
  kernfs_fop_write_iter+0x108/0x1d0
  vfs_write+0x2f4/0x368
  ksys_write+0x7c/0xec
  __arm64_sys_write+0x20/0x30
  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc
  do_el0_svc+0x28/0xa0
  el0_svc+0x14/0x24
  el0_sync_handler+0x88/0xec
  el0_sync+0x1c0/0x200

While at it, fix the possible NULL pointer dereference in other
functions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),
of_thermal_get_trend().</Note>
    </Notes>
    <CVE>CVE-2021-47202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47202.html</URL>
        <Description>CVE-2021-47202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222878</URL>
        <Description>SUSE Bug 1222878</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()

When parsing the txq list in lpfc_drain_txq(), the driver attempts to pass
the requests to the adapter. If such an attempt fails, a local "fail_msg"
string is set and a log message output.  The job is then added to a
completions list for cancellation.

Processing of any further jobs from the txq list continues, but since
"fail_msg" remains set, jobs are added to the completions list regardless
of whether a wqe was passed to the adapter.  If successfully added to
txcmplq, jobs are added to both lists resulting in list corruption.

Fix by clearing the fail_msg string after adding a job to the completions
list. This stops the subsequent jobs from being added to the completions
list unless they had an appropriate failure.</Note>
    </Notes>
    <CVE>CVE-2021-47203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47203.html</URL>
        <Description>CVE-2021-47203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222881</URL>
        <Description>SUSE Bug 1222881</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove

Access to netdev after free_netdev() will cause use-after-free bug.
Move debug log before free_netdev() call to avoid it.</Note>
    </Notes>
    <CVE>CVE-2021-47204</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47204.html</URL>
        <Description>CVE-2021-47204</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222787</URL>
        <Description>SUSE Bug 1222787</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: Unregister clocks/resets when unbinding

Currently, unbinding a CCU driver unmaps the device's MMIO region, while
leaving its clocks/resets and their providers registered. This can cause
a page fault later when some clock operation tries to perform MMIO. Fix
this by separating the CCU initialization from the memory allocation,
and then using a devres callback to unregister the clocks and resets.

This also fixes a memory leak of the `struct ccu_reset`, and uses the
correct owner (the specific platform driver) for the clocks and resets.

Early OF clock providers are never unregistered, and limited error
handling is possible, so they are mostly unchanged. The error reporting
is made more consistent by moving the message inside of_sunxi_ccu_probe.</Note>
    </Notes>
    <CVE>CVE-2021-47205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47205.html</URL>
        <Description>CVE-2021-47205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222888</URL>
        <Description>SUSE Bug 1222888</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: host: ohci-tmio: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.</Note>
    </Notes>
    <CVE>CVE-2021-47206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47206.html</URL>
        <Description>CVE-2021-47206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222894</URL>
        <Description>SUSE Bug 1222894</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: gus: fix null pointer dereference on pointer block

The pointer block return from snd_gf1_dma_next_block could be
null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.</Note>
    </Notes>
    <CVE>CVE-2021-47207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47207.html</URL>
        <Description>CVE-2021-47207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222790</URL>
        <Description>SUSE Bug 1222790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Prevent dead task groups from regaining cfs_rq's

Kevin is reporting crashes which point to a use-after-free of a cfs_rq
in update_blocked_averages(). Initial debugging revealed that we've
live cfs_rq's (on_list=1) in an about to be kfree()'d task group in
free_fair_sched_group(). However, it was unclear how that can happen.

His kernel config happened to lead to a layout of struct sched_entity
that put the 'my_q' member directly into the middle of the object
which makes it incidentally overlap with SLUB's freelist pointer.
That, in combination with SLAB_FREELIST_HARDENED's freelist pointer
mangling, leads to a reliable access violation in form of a #GP which
made the UAF fail fast.

Michal seems to have run into the same issue[1]. He already correctly
diagnosed that commit a7b359fc6a37 ("sched/fair: Correctly insert
cfs_rq's to list on unthrottle") is causing the preconditions for the
UAF to happen by re-adding cfs_rq's also to task groups that have no
more running tasks, i.e. also to dead ones. His analysis, however,
misses the real root cause and it cannot be seen from the crash
backtrace only, as the real offender is tg_unthrottle_up() getting
called via sched_cfs_period_timer() via the timer interrupt at an
inconvenient time.

When unregister_fair_sched_group() unlinks all cfs_rq's from the dying
task group, it doesn't protect itself from getting interrupted. If the
timer interrupt triggers while we iterate over all CPUs or after
unregister_fair_sched_group() has finished but prior to unlinking the
task group, sched_cfs_period_timer() will execute and walk the list of
task groups, trying to unthrottle cfs_rq's, i.e. re-add them to the
dying task group. These will later -- in free_fair_sched_group() -- be
kfree()'ed while still being linked, leading to the fireworks Kevin
and Michal are seeing.

To fix this race, ensure the dying task group gets unlinked first.
However, simply switching the order of unregistering and unlinking the
task group isn't sufficient, as concurrent RCU walkers might still see
it, as can be seen below:

    CPU1:                                      CPU2:
      :                                        timer IRQ:
      :                                          do_sched_cfs_period_timer():
      :                                            :
      :                                            distribute_cfs_runtime():
      :                                              rcu_read_lock();
      :                                              :
      :                                              unthrottle_cfs_rq():
    sched_offline_group():                             :
      :                                                walk_tg_tree_from(…,tg_unthrottle_up,…):
      list_del_rcu(&amp;tg-&gt;list);                           :
 (1)  :                                                  list_for_each_entry_rcu(child, &amp;parent-&gt;children, siblings)
      :                                                    :
 (2)  list_del_rcu(&amp;tg-&gt;siblings);                         :
      :                                                    tg_unthrottle_up():
      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-&gt;cfs_rq[cpu_of(rq)];
        :                                                    :
        list_del_leaf_cfs_rq(tg-&gt;cfs_rq[cpu]);               :
        :                                                    :
        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-&gt;nr_running)
 (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);
      :                                                      :
      :                                                    :
      :                                                  :
      :                                                :
      :                           
---truncated---</Note>
    </Notes>
    <CVE>CVE-2021-47209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47209.html</URL>
        <Description>CVE-2021-47209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222796</URL>
        <Description>SUSE Bug 1222796</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Remove WARN_ON in tps6598x_block_read

Calling tps6598x_block_read with a higher than allowed len can be
handled by just returning an error. There's no need to crash systems
with panic-on-warn enabled.</Note>
    </Notes>
    <CVE>CVE-2021-47210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47210.html</URL>
        <Description>CVE-2021-47210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222901</URL>
        <Description>SUSE Bug 1222901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: fix null pointer dereference on pointer cs_desc

The pointer cs_desc return from snd_usb_find_clock_source could
be null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.</Note>
    </Notes>
    <CVE>CVE-2021-47211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47211.html</URL>
        <Description>CVE-2021-47211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222869</URL>
        <Description>SUSE Bug 1222869</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Update error handler for UCTX and UMEM

In the fast unload flow, the device state is set to internal error,
which indicates that the driver started the destroy process.
In this case, when a destroy command is being executed, it should return
MLX5_CMD_STAT_OK.
Fix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK
instead of EIO.

This fixes a call trace in the umem release process -
[ 2633.536695] Call Trace:
[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]
[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]
[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]
[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]
[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]
[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]
[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]
[ 2633.544661]  device_release_driver_internal+0x103/0x1f0
[ 2633.545679]  bus_remove_device+0xf7/0x170
[ 2633.546640]  device_del+0x181/0x410
[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]
[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]
[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]
[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]
[ 2633.551819]  pci_device_remove+0x3b/0xc0
[ 2633.552731]  device_release_driver_internal+0x103/0x1f0
[ 2633.553746]  unbind_store+0xf6/0x130
[ 2633.554657]  kernfs_fop_write+0x116/0x190
[ 2633.555567]  vfs_write+0xa5/0x1a0
[ 2633.556407]  ksys_write+0x4f/0xb0
[ 2633.557233]  do_syscall_64+0x5b/0x1a0
[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[ 2633.559018] RIP: 0033:0x7f9977132648
[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55
[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648
[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001
[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740
[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0
[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c
[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---</Note>
    </Notes>
    <CVE>CVE-2021-47212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47212.html</URL>
        <Description>CVE-2021-47212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222709</URL>
        <Description>SUSE Bug 1222709</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hugetlb, userfaultfd: fix reservation restore on userfaultfd error

Currently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we
bail out using "goto out_release_unlock;" in the cases where idx &gt;=
size, or !huge_pte_none(), the code will detect that new_pagecache_page
== false, and so call restore_reserve_on_error().  In this case I see
restore_reserve_on_error() delete the reservation, and the following
call to remove_inode_hugepages() will increment h-&gt;resv_hugepages
causing a 100% reproducible leak.

We should treat the is_continue case similar to adding a page into the
pagecache and set new_pagecache_page to true, to indicate that there is
no reservation to restore on the error path, and we need not call
restore_reserve_on_error().  Rename new_pagecache_page to
page_in_pagecache to make that clear.</Note>
    </Notes>
    <CVE>CVE-2021-47214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47214.html</URL>
        <Description>CVE-2021-47214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222710</URL>
        <Description>SUSE Bug 1222710</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: kTLS, Fix crash in RX resync flow

For the TLS RX resync flow, we maintain a list of TLS contexts
that require some attention, to communicate their resync information
to the HW.
Here we fix list corruptions, by protecting the entries against
movements coming from resync_handle_seq_match(), until their resync
handling in napi is fully completed.</Note>
    </Notes>
    <CVE>CVE-2021-47215</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47215.html</URL>
        <Description>CVE-2021-47215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222704</URL>
        <Description>SUSE Bug 1222704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: advansys: Fix kernel pointer leak

Pointers should be printed with %p or %px rather than cast to 'unsigned
long' and printed with %lx.

Change %lx to %p to print the hashed pointer.</Note>
    </Notes>
    <CVE>CVE-2021-47216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47216.html</URL>
        <Description>CVE-2021-47216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222876</URL>
        <Description>SUSE Bug 1222876</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails

Check for a valid hv_vp_index array prior to derefencing hv_vp_index when
setting Hyper-V's TSC change callback.  If Hyper-V setup failed in
hyperv_init(), the kernel will still report that it's running under
Hyper-V, but will have silently disabled nearly all functionality.

  BUG: kernel NULL pointer dereference, address: 0000000000000010
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP
  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0
  Code: &lt;8b&gt; 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08
  ...
  Call Trace:
   kvm_arch_init+0x17c/0x280
   kvm_init+0x31/0x330
   vmx_init+0xba/0x13a
   do_one_initcall+0x41/0x1c0
   kernel_init_freeable+0x1f2/0x23b
   kernel_init+0x16/0x120
   ret_from_fork+0x22/0x30</Note>
    </Notes>
    <CVE>CVE-2021-47217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47217.html</URL>
        <Description>CVE-2021-47217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222836</URL>
        <Description>SUSE Bug 1222836</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

selinux: fix NULL-pointer dereference when hashtab allocation fails

When the hash table slot array allocation fails in hashtab_init(),
h-&gt;size is left initialized with a non-zero value, but the h-&gt;htable
pointer is NULL. This may then cause a NULL pointer dereference, since
the policydb code relies on the assumption that even after a failed
hashtab_init(), hashtab_map() and hashtab_destroy() can be safely called
on it. Yet, these detect an empty hashtab only by looking at the size.

Fix this by making sure that hashtab_init() always leaves behind a valid
empty hashtab when the allocation fails.</Note>
    </Notes>
    <CVE>CVE-2021-47218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47218.html</URL>
        <Description>CVE-2021-47218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222791</URL>
        <Description>SUSE Bug 1222791</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()

The following issue was observed running syzkaller:

BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]
BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
Read of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815

CPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0xe4/0x14a lib/dump_stack.c:118
 print_address_description+0x73/0x280 mm/kasan/report.c:253
 kasan_report_error mm/kasan/report.c:352 [inline]
 kasan_report+0x272/0x370 mm/kasan/report.c:410
 memcpy+0x1f/0x50 mm/kasan/kasan.c:302
 memcpy include/linux/string.h:377 [inline]
 sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
 fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021
 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772
 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429
 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835
 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896
 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034
 __blk_run_queue_uncond block/blk-core.c:464 [inline]
 __blk_run_queue+0x1a4/0x380 block/blk-core.c:484
 blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78
 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847
 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716
 sg_write+0x64/0xa0 drivers/scsi/sg.c:622
 __vfs_write+0xed/0x690 fs/read_write.c:485
kill_bdev:block_device:00000000e138492c
 vfs_write+0x184/0x4c0 fs/read_write.c:549
 ksys_write+0x107/0x240 fs/read_write.c:599
 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe

We get 'alen' from command its type is int. If userspace passes a large
length we will get a negative 'alen'.

Switch n, alen, and rlen to u32.</Note>
    </Notes>
    <CVE>CVE-2021-47219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47219.html</URL>
        <Description>CVE-2021-47219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222824</URL>
        <Description>SUSE Bug 1222824</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0

When walking through an inode extents, the ext4_ext_binsearch_idx() function
assumes that the extent header has been previously validated.  However, there
are no checks that verify that the number of entries (eh-&gt;eh_entries) is
non-zero when depth is &gt; 0.  And this will lead to problems because the
EXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:

[  135.245946] ------------[ cut here ]------------
[  135.247579] kernel BUG at fs/ext4/extents.c:2258!
[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP
[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4
[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014
[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0
[  135.256475] Code:
[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246
[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023
[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c
[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c
[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024
[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000
[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0
[  135.277952] Call Trace:
[  135.278635]  &lt;TASK&gt;
[  135.279247]  ? preempt_count_add+0x6d/0xa0
[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0
[  135.281612]  ? _raw_read_unlock+0x18/0x30
[  135.282704]  ext4_map_blocks+0x294/0x5a0
[  135.283745]  ? xa_load+0x6f/0xa0
[  135.284562]  ext4_mpage_readpages+0x3d6/0x770
[  135.285646]  read_pages+0x67/0x1d0
[  135.286492]  ? folio_add_lru+0x51/0x80
[  135.287441]  page_cache_ra_unbounded+0x124/0x170
[  135.288510]  filemap_get_pages+0x23d/0x5a0
[  135.289457]  ? path_openat+0xa72/0xdd0
[  135.290332]  filemap_read+0xbf/0x300
[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40
[  135.292192]  new_sync_read+0x103/0x170
[  135.293014]  vfs_read+0x15d/0x180
[  135.293745]  ksys_read+0xa1/0xe0
[  135.294461]  do_syscall_64+0x3c/0x80
[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0

This patch simply adds an extra check in __ext4_ext_check(), verifying that
eh_entries is not 0 when eh_depth is &gt; 0.</Note>
    </Notes>
    <CVE>CVE-2022-48631</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48631.html</URL>
        <Description>CVE-2022-48631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223475</URL>
        <Description>SUSE Bug 1223475</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()

memcpy() is called in a loop while 'operation-&gt;length' upper bound
is not checked and 'data_idx' also increments.</Note>
    </Notes>
    <CVE>CVE-2022-48632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48632.html</URL>
        <Description>CVE-2022-48632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223481</URL>
        <Description>SUSE Bug 1223481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix BUG: sleeping function called from invalid context errors

gma_crtc_page_flip() was holding the event_lock spinlock while calling
crtc_funcs-&gt;mode_set_base() which takes ww_mutex.

The only reason to hold event_lock is to clear gma_crtc-&gt;page_flip_event
on mode_set_base() errors.

Instead unlock it after setting gma_crtc-&gt;page_flip_event and on
errors re-take the lock and clear gma_crtc-&gt;page_flip_event it
it is still set.

This fixes the following WARN/stacktrace:

[  512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870
[  512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell
[  512.123031] preempt_count: 1, expected: 0
[  512.123048] RCU nest depth: 0, expected: 0
[  512.123066] INFO: lockdep is turned off.
[  512.123080] irq event stamp: 0
[  512.123094] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123134] hardirqs last disabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123176] softirqs last  enabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123207] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123233] Preemption disabled at:
[  512.123241] [&lt;0000000000000000&gt;] 0x0
[  512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G        W         5.19.0+ #1
[  512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013
[  512.123323] Call Trace:
[  512.123346]  &lt;TASK&gt;
[  512.123370]  dump_stack_lvl+0x5b/0x77
[  512.123412]  __might_resched.cold+0xff/0x13a
[  512.123458]  ww_mutex_lock+0x1e/0xa0
[  512.123495]  psb_gem_pin+0x2c/0x150 [gma500_gfx]
[  512.123601]  gma_pipe_set_base+0x76/0x240 [gma500_gfx]
[  512.123708]  gma_crtc_page_flip+0x95/0x130 [gma500_gfx]
[  512.123808]  drm_mode_page_flip_ioctl+0x57d/0x5d0
[  512.123897]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.123936]  drm_ioctl_kernel+0xa1/0x150
[  512.123984]  drm_ioctl+0x21f/0x420
[  512.124025]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.124070]  ? rcu_read_lock_bh_held+0xb/0x60
[  512.124104]  ? lock_release+0x1ef/0x2d0
[  512.124161]  __x64_sys_ioctl+0x8d/0xd0
[  512.124203]  do_syscall_64+0x58/0x80
[  512.124239]  ? do_syscall_64+0x67/0x80
[  512.124267]  ? trace_hardirqs_on_prepare+0x55/0xe0
[  512.124300]  ? do_syscall_64+0x67/0x80
[  512.124340]  ? rcu_read_lock_sched_held+0x10/0x80
[  512.124377]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  512.124411] RIP: 0033:0x7fcc4a70740f
[  512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
[  512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f
[  512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009
[  512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034
[  512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0
[  512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0
[  512.124647]  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2022-48634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48634.html</URL>
        <Description>CVE-2022-48634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223501</URL>
        <Description>SUSE Bug 1223501</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup

Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup
pointer being NULL.

The pavgroup pointer is checked on the entrance of the function but
without the lcu-&gt;lock being held. Therefore there is a race window
between dasd_alias_get_start_dev() and _lcu_update() which sets
pavgroup to NULL with the lcu-&gt;lock held.

Fix by checking the pavgroup pointer with lcu-&gt;lock held.</Note>
    </Notes>
    <CVE>CVE-2022-48636</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48636.html</URL>
        <Description>CVE-2022-48636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223512</URL>
        <Description>SUSE Bug 1223512</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bnxt: prevent skb UAF after handing over to PTP worker

When reading the timestamp is required bnxt_tx_int() hands
over the ownership of the completed skb to the PTP worker.
The skb should not be used afterwards, as the worker may
run before the rest of our code and free the skb, leading
to a use-after-free.

Since dev_kfree_skb_any() accepts NULL make the loss of
ownership more obvious and set skb to NULL.</Note>
    </Notes>
    <CVE>CVE-2022-48637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48637.html</URL>
        <Description>CVE-2022-48637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223517</URL>
        <Description>SUSE Bug 1223517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cgroup: cgroup_get_from_id() must check the looked-up kn is a directory

cgroup has to be one kernfs dir, otherwise kernel panic is caused,
especially cgroup id is provide from userspace.</Note>
    </Notes>
    <CVE>CVE-2022-48638</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48638.html</URL>
        <Description>CVE-2022-48638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223522</URL>
        <Description>SUSE Bug 1223522</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix possible refcount leak in tc_new_tfilter()

tfilter_put need to be called to put the refount got by tp-&gt;ops-&gt;get to
avoid possible refcount leak when chain-&gt;tmplt_ops != NULL and
chain-&gt;tmplt_ops != tp-&gt;ops.</Note>
    </Notes>
    <CVE>CVE-2022-48639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48639.html</URL>
        <Description>CVE-2022-48639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223490</URL>
        <Description>SUSE Bug 1223490</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bonding: fix NULL deref in bond_rr_gen_slave_id

Fix a NULL dereference of the struct bonding.rr_tx_counter member because
if a bond is initially created with an initial mode != zero (Round Robin)
the memory required for the counter is never created and when the mode is
changed there is never any attempt to verify the memory is allocated upon
switching modes.

This causes the following Oops on an aarch64 machine:
    [  334.686773] Unable to handle kernel paging request at virtual address ffff2c91ac905000
    [  334.694703] Mem abort info:
    [  334.697486]   ESR = 0x0000000096000004
    [  334.701234]   EC = 0x25: DABT (current EL), IL = 32 bits
    [  334.706536]   SET = 0, FnV = 0
    [  334.709579]   EA = 0, S1PTW = 0
    [  334.712719]   FSC = 0x04: level 0 translation fault
    [  334.717586] Data abort info:
    [  334.720454]   ISV = 0, ISS = 0x00000004
    [  334.724288]   CM = 0, WnR = 0
    [  334.727244] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008044d662000
    [  334.733944] [ffff2c91ac905000] pgd=0000000000000000, p4d=0000000000000000
    [  334.740734] Internal error: Oops: 96000004 [#1] SMP
    [  334.745602] Modules linked in: bonding tls veth rfkill sunrpc arm_spe_pmu vfat fat acpi_ipmi ipmi_ssif ixgbe igb i40e mdio ipmi_devintf ipmi_msghandler arm_cmn arm_dsu_pmu cppc_cpufreq acpi_tad fuse zram crct10dif_ce ast ghash_ce sbsa_gwdt nvme drm_vram_helper drm_ttm_helper nvme_core ttm xgene_hwmon
    [  334.772217] CPU: 7 PID: 2214 Comm: ping Not tainted 6.0.0-rc4-00133-g64ae13ed4784 #4
    [  334.779950] Hardware name: GIGABYTE R272-P31-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021
    [  334.789244] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    [  334.796196] pc : bond_rr_gen_slave_id+0x40/0x124 [bonding]
    [  334.801691] lr : bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]
    [  334.807962] sp : ffff8000221733e0
    [  334.811265] x29: ffff8000221733e0 x28: ffffdbac8572d198 x27: ffff80002217357c
    [  334.818392] x26: 000000000000002a x25: ffffdbacb33ee000 x24: ffff07ff980fa000
    [  334.825519] x23: ffffdbacb2e398ba x22: ffff07ff98102000 x21: ffff07ff981029c0
    [  334.832646] x20: 0000000000000001 x19: ffff07ff981029c0 x18: 0000000000000014
    [  334.839773] x17: 0000000000000000 x16: ffffdbacb1004364 x15: 0000aaaabe2f5a62
    [  334.846899] x14: ffff07ff8e55d968 x13: ffff07ff8e55db30 x12: 0000000000000000
    [  334.854026] x11: ffffdbacb21532e8 x10: 0000000000000001 x9 : ffffdbac857178ec
    [  334.861153] x8 : ffff07ff9f6e5a28 x7 : 0000000000000000 x6 : 000000007c2b3742
    [  334.868279] x5 : ffff2c91ac905000 x4 : ffff2c91ac905000 x3 : ffff07ff9f554400
    [  334.875406] x2 : ffff2c91ac905000 x1 : 0000000000000001 x0 : ffff07ff981029c0
    [  334.882532] Call trace:
    [  334.884967]  bond_rr_gen_slave_id+0x40/0x124 [bonding]
    [  334.890109]  bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]
    [  334.896033]  __bond_start_xmit+0x128/0x3a0 [bonding]
    [  334.901001]  bond_start_xmit+0x54/0xb0 [bonding]
    [  334.905622]  dev_hard_start_xmit+0xb4/0x220
    [  334.909798]  __dev_queue_xmit+0x1a0/0x720
    [  334.913799]  arp_xmit+0x3c/0xbc
    [  334.916932]  arp_send_dst+0x98/0xd0
    [  334.920410]  arp_solicit+0xe8/0x230
    [  334.923888]  neigh_probe+0x60/0xb0
    [  334.927279]  __neigh_event_send+0x3b0/0x470
    [  334.931453]  neigh_resolve_output+0x70/0x90
    [  334.935626]  ip_finish_output2+0x158/0x514
    [  334.939714]  __ip_finish_output+0xac/0x1a4
    [  334.943800]  ip_finish_output+0x40/0xfc
    [  334.947626]  ip_output+0xf8/0x1a4
    [  334.950931]  ip_send_skb+0x5c/0x100
    [  334.954410]  ip_push_pending_frames+0x3c/0x60
    [  334.958758]  raw_sendmsg+0x458/0x6d0
    [  334.962325]  inet_sendmsg+0x50/0x80
    [  334.965805]  sock_sendmsg+0x60/0x6c
    [  334.969286]  __sys_sendto+0xc8/0x134
    [  334.972853]  __arm64_sys_sendto+0x34/0x4c
---truncated---</Note>
    </Notes>
    <CVE>CVE-2022-48640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48640.html</URL>
        <Description>CVE-2022-48640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223499</URL>
        <Description>SUSE Bug 1223499</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()

It seems to me that percpu memory for chain stats started leaking since
commit 3bc158f8d0330f0a ("netfilter: nf_tables: map basechain priority to
hardware priority") when nft_chain_offload_priority() returned an error.</Note>
    </Notes>
    <CVE>CVE-2022-48642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48642.html</URL>
        <Description>CVE-2022-48642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223478</URL>
        <Description>SUSE Bug 1223478</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: avoid disabling offload when it was never enabled

In an incredibly strange API design decision, qdisc-&gt;destroy() gets
called even if qdisc-&gt;init() never succeeded, not exclusively since
commit 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation"),
but apparently also earlier (in the case of qdisc_create_dflt()).

The taprio qdisc does not fully acknowledge this when it attempts full
offload, because it starts off with q-&gt;flags = TAPRIO_FLAGS_INVALID in
taprio_init(), then it replaces q-&gt;flags with TCA_TAPRIO_ATTR_FLAGS
parsed from netlink (in taprio_change(), tail called from taprio_init()).

But in taprio_destroy(), we call taprio_disable_offload(), and this
determines what to do based on FULL_OFFLOAD_IS_ENABLED(q-&gt;flags).

But looking at the implementation of FULL_OFFLOAD_IS_ENABLED()
(a bitwise check of bit 1 in q-&gt;flags), it is invalid to call this macro
on q-&gt;flags when it contains TAPRIO_FLAGS_INVALID, because that is set
to U32_MAX, and therefore FULL_OFFLOAD_IS_ENABLED() will return true on
an invalid set of flags.

As a result, it is possible to crash the kernel if user space forces an
error between setting q-&gt;flags = TAPRIO_FLAGS_INVALID, and the calling
of taprio_enable_offload(). This is because drivers do not expect the
offload to be disabled when it was never enabled.

The error that we force here is to attach taprio as a non-root qdisc,
but instead as child of an mqprio root qdisc:

$ tc qdisc add dev swp0 root handle 1: \
	mqprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0
$ tc qdisc replace dev swp0 parent 1:1 \
	taprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \
	sched-entry S 0x7f 990000 sched-entry S 0x80 100000 \
	flags 0x0 clockid CLOCK_TAI
Unable to handle kernel paging request at virtual address fffffffffffffff8
[fffffffffffffff8] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 96000004 [#1] PREEMPT SMP
Call trace:
 taprio_dump+0x27c/0x310
 vsc9959_port_setup_tc+0x1f4/0x460
 felix_port_setup_tc+0x24/0x3c
 dsa_slave_setup_tc+0x54/0x27c
 taprio_disable_offload.isra.0+0x58/0xe0
 taprio_destroy+0x80/0x104
 qdisc_create+0x240/0x470
 tc_modify_qdisc+0x1fc/0x6b0
 rtnetlink_rcv_msg+0x12c/0x390
 netlink_rcv_skb+0x5c/0x130
 rtnetlink_rcv+0x1c/0x2c

Fix this by keeping track of the operations we made, and undo the
offload only if we actually did it.

I've added "bool offloaded" inside a 4 byte hole between "int clockid"
and "atomic64_t picos_per_byte". Now the first cache line looks like
below:

$ pahole -C taprio_sched net/sched/sch_taprio.o
struct taprio_sched {
        struct Qdisc * *           qdiscs;               /*     0     8 */
        struct Qdisc *             root;                 /*     8     8 */
        u32                        flags;                /*    16     4 */
        enum tk_offsets            tk_offset;            /*    20     4 */
        int                        clockid;              /*    24     4 */
        bool                       offloaded;            /*    28     1 */

        /* XXX 3 bytes hole, try to pack */

        atomic64_t                 picos_per_byte;       /*    32     0 */

        /* XXX 8 bytes hole, try to pack */

        spinlock_t                 current_entry_lock;   /*    40     0 */

        /* XXX 8 bytes hole, try to pack */

        struct sched_entry *       current_entry;        /*    48     8 */
        struct sched_gate_list *   oper_sched;           /*    56     8 */
        /* --- cacheline 1 boundary (64 bytes) --- */</Note>
    </Notes>
    <CVE>CVE-2022-48644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48644.html</URL>
        <Description>CVE-2022-48644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223511</URL>
        <Description>SUSE Bug 1223511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sfc/siena: fix null pointer dereference in efx_hard_start_xmit

Like in previous patch for sfc, prevent potential (but unlikely) NULL
pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2022-48646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48646.html</URL>
        <Description>CVE-2022-48646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223502</URL>
        <Description>SUSE Bug 1223502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sfc: fix TX channel offset when using legacy interrupts

In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but
that's not correct if efx_sepparate_tx_channels is false. In that case,
the offset is 0 because the tx queues are in the single existing channel
at index 0, together with the rx queue.

Without this fix, as soon as you try to send any traffic, it tries to
get the tx queues from an uninitialized channel getting these errors:
  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]</Note>
    </Notes>
    <CVE>CVE-2022-48647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48647.html</URL>
        <Description>CVE-2022-48647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223519</URL>
        <Description>SUSE Bug 1223519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sfc: fix null pointer dereference in efx_hard_start_xmit

Trying to get the channel from the tx_queue variable here is wrong
because we can only be here if tx_queue is NULL, so we shouldn't
dereference it. As the above comment in the code says, this is very
unlikely to happen, but it's wrong anyway so let's fix it.

I hit this issue because of a different bug that caused tx_queue to be
NULL. If that happens, this is the error message that we get here:
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]</Note>
    </Notes>
    <CVE>CVE-2022-48648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48648.html</URL>
        <Description>CVE-2022-48648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223503</URL>
        <Description>SUSE Bug 1223503</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()

Commit 8f394da36a36 ("scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG")
made the __qlt_24xx_handle_abts() function return early if
tcm_qla2xxx_find_cmd_by_tag() didn't find a command, but it missed to clean
up the allocated memory for the management command.</Note>
    </Notes>
    <CVE>CVE-2022-48650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48650.html</URL>
        <Description>CVE-2022-48650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223509</URL>
        <Description>SUSE Bug 1223509</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipvlan: Fix out-of-bound bugs caused by unset skb-&gt;mac_header

If an AF_PACKET socket is used to send packets through ipvlan and the
default xmit function of the AF_PACKET socket is changed from
dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option
name of PACKET_QDISC_BYPASS, the skb-&gt;mac_header may not be reset and
remains as the initial value of 65535, this may trigger slab-out-of-bounds
bugs as following:

=================================================================
UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6
ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33
all Trace:
print_address_description.constprop.0+0x1d/0x160
print_report.cold+0x4f/0x112
kasan_report+0xa3/0x130
ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
ipvlan_start_xmit+0x29/0xa0 [ipvlan]
__dev_direct_xmit+0x2e2/0x380
packet_direct_xmit+0x22/0x60
packet_snd+0x7c9/0xc40
sock_sendmsg+0x9a/0xa0
__sys_sendto+0x18a/0x230
__x64_sys_sendto+0x74/0x90
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd

The root cause is:
  1. packet_snd() only reset skb-&gt;mac_header when sock-&gt;type is SOCK_RAW
     and skb-&gt;protocol is not specified as in packet_parse_headers()

  2. packet_direct_xmit() doesn't reset skb-&gt;mac_header as dev_queue_xmit()

In this case, skb-&gt;mac_header is 65535 when ipvlan_xmit_mode_l2() is
called. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which
use "skb-&gt;head + skb-&gt;mac_header", out-of-bound access occurs.

This patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()
and reset mac header in multicast to solve this out-of-bound bug.</Note>
    </Notes>
    <CVE>CVE-2022-48651</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48651.html</URL>
        <Description>CVE-2022-48651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223513</URL>
        <Description>SUSE Bug 1223513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223514</URL>
        <Description>SUSE Bug 1223514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ice: Fix crash by keep old cfg when update TCs more than queues

There are problems if allocated queues less than Traffic Classes.

Commit a632b2a4c920 ("ice: ethtool: Prohibit improper channel config
for DCB") already disallow setting less queues than TCs.

Another case is if we first set less queues, and later update more TCs
config due to LLDP, ice_vsi_cfg_tc() will failed but left dirty
num_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.

[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.
[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!
[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0
[   95.969621] general protection fault: 0000 [#1] SMP NOPTI
[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1
[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021
[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60
[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 &lt;8b&gt; 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c
[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206
[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0
[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200
[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000
[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100
[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460
[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000
[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0
[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   95.971530] PKRU: 55555554
[   95.971573] Call Trace:
[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]
[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]
[   95.971774]  ice_vsi_open+0x25/0x120 [ice]
[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]
[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]
[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]
[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]
[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]
[   95.972220]  dcbnl_ieee_set+0x89/0x230
[   95.972279]  ? dcbnl_ieee_del+0x150/0x150
[   95.972341]  dcb_doit+0x124/0x1b0
[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0
[   95.972457]  ? dcb_doit+0x14d/0x1b0
[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280
[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100
[   95.972661]  netlink_rcv_skb+0xcf/0xf0
[   95.972720]  netlink_unicast+0x16d/0x220
[   95.972781]  netlink_sendmsg+0x2ba/0x3a0
[   95.975891]  sock_sendmsg+0x4c/0x50
[   95.979032]  ___sys_sendmsg+0x2e4/0x300
[   95.982147]  ? kmem_cache_alloc+0x13e/0x190
[   95.985242]  ? __wake_up_common_lock+0x79/0x90
[   95.988338]  ? __check_object_size+0xac/0x1b0
[   95.991440]  ? _copy_to_user+0x22/0x30
[   95.994539]  ? move_addr_to_user+0xbb/0xd0
[   95.997619]  ? __sys_sendmsg+0x53/0x80
[   96.000664]  __sys_sendmsg+0x53/0x80
[   96.003747]  do_syscall_64+0x5b/0x1d0
[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca

Only update num_txq/rxq when passed check, and restore tc_cfg if setup
queue map failed.</Note>
    </Notes>
    <CVE>CVE-2022-48652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48652.html</URL>
        <Description>CVE-2022-48652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223520</URL>
        <Description>SUSE Bug 1223520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ice: Don't double unplug aux on peer initiated reset

In the IDC callback that is accessed when the aux drivers request a reset,
the function to unplug the aux devices is called.  This function is also
called in the ice_prepare_for_reset function. This double call is causing
a "scheduling while atomic" BUG.

[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003

[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003

[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003

[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424

[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002
[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe
 r ttm
[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse
[  662.815557] Preemption disabled at:
[  662.815558] [&lt;0000000000000000&gt;] 0x0
[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2
[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021
[  662.815568] Call Trace:
[  662.815572]  &lt;IRQ&gt;
[  662.815574]  dump_stack_lvl+0x33/0x42
[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a
[  662.815588]  __schedule+0x798/0x990
[  662.815595]  schedule+0x44/0xc0
[  662.815597]  schedule_preempt_disabled+0x14/0x20
[  662.815600]  __mutex_lock.isra.11+0x46c/0x490
[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]
[  662.815633]  device_del+0x37/0x3d0
[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]
[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]
[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]
[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0
[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]
[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]
[  662.815756]  __handle_irq_event_percpu+0x4c/0x180
[  662.815762]  handle_irq_event_percpu+0xf/0x40
[  662.815764]  handle_irq_event+0x34/0x60
[  662.815766]  handle_edge_irq+0x9a/0x1c0
[  662.815770]  __common_interrupt+0x62/0x100
[  662.815774]  common_interrupt+0xb4/0xd0
[  662.815779]  &lt;/IRQ&gt;
[  662.815780]  &lt;TASK&gt;
[  662.815780]  asm_common_interrupt+0x1e/0x40
[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380
[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 &lt;0f&gt; 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49
[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202
[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f
[  662.815795] RDX: 0000009a52da2d08 R
---truncated---</Note>
    </Notes>
    <CVE>CVE-2022-48653</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48653.html</URL>
        <Description>CVE-2022-48653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223474</URL>
        <Description>SUSE Bug 1223474</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()

nf_osf_find() incorrectly returns true on mismatch, this leads to
copying uninitialized memory area in nft_osf which can be used to leak
stale kernel stack data to userspace.</Note>
    </Notes>
    <CVE>CVE-2022-48654</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48654.html</URL>
        <Description>CVE-2022-48654</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223482</URL>
        <Description>SUSE Bug 1223482</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Harden accesses to the reset domains

Accessing reset domains descriptors by the index upon the SCMI drivers
requests through the SCMI reset operations interface can potentially
lead to out-of-bound violations if the SCMI driver misbehave.

Add an internal consistency check before any such domains descriptors
accesses.</Note>
    </Notes>
    <CVE>CVE-2022-48655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48655.html</URL>
        <Description>CVE-2022-48655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223477</URL>
        <Description>SUSE Bug 1223477</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()

We should call of_node_put() for the reference returned by
of_parse_phandle() in fail path or when it is not used anymore.
Here we only need to move the of_node_put() before the check.</Note>
    </Notes>
    <CVE>CVE-2022-48656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48656.html</URL>
        <Description>CVE-2022-48656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223479</URL>
        <Description>SUSE Bug 1223479</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: topology: fix possible overflow in amu_fie_setup()

cpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,
while freq_inv_set_max_ratio() gets passed this frequency in Hz as 'u64'.
Multiplying max frequency by 1000 can potentially result in overflow --
multiplying by 1000ULL instead should avoid that...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.</Note>
    </Notes>
    <CVE>CVE-2022-48657</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48657.html</URL>
        <Description>CVE-2022-48657</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223484</URL>
        <Description>SUSE Bug 1223484</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.

Commit 5a836bf6b09f ("mm: slub: move flush_cpu_slab() invocations
__free_slab() invocations out of IRQ context") moved all flush_cpu_slab()
invocations to the global workqueue to avoid a problem related
with deactivate_slab()/__free_slab() being called from an IRQ context
on PREEMPT_RT kernels.

When the flush_all_cpu_locked() function is called from a task context
it may happen that a workqueue with WQ_MEM_RECLAIM bit set ends up
flushing the global workqueue, this will cause a dependency issue.

 workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core]
   is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab
 WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637
   check_flush_dependency+0x10a/0x120
 Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core]
 RIP: 0010:check_flush_dependency+0x10a/0x120[  453.262125] Call Trace:
 __flush_work.isra.0+0xbf/0x220
 ? __queue_work+0x1dc/0x420
 flush_all_cpus_locked+0xfb/0x120
 __kmem_cache_shutdown+0x2b/0x320
 kmem_cache_destroy+0x49/0x100
 bioset_exit+0x143/0x190
 blk_release_queue+0xb9/0x100
 kobject_cleanup+0x37/0x130
 nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc]
 nvme_free_ctrl+0x1ac/0x2b0 [nvme_core]

Fix this bug by creating a workqueue for the flush operation with
the WQ_MEM_RECLAIM bit set.</Note>
    </Notes>
    <CVE>CVE-2022-48658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48658.html</URL>
        <Description>CVE-2022-48658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223496</URL>
        <Description>SUSE Bug 1223496</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/slub: fix to return errno if kmalloc() fails

In create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to
out-of-memory, if it fails, return errno correctly rather than
triggering panic via BUG_ON();

kernel BUG at mm/slub.c:5893!
Internal error: Oops - BUG: 0 [#1] PREEMPT SMP

Call trace:
 sysfs_slab_add+0x258/0x260 mm/slub.c:5973
 __kmem_cache_create+0x60/0x118 mm/slub.c:4899
 create_cache mm/slab_common.c:229 [inline]
 kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335
 kmem_cache_create+0x1c/0x28 mm/slab_common.c:390
 f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]
 f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808
 f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149
 mount_bdev+0x1b8/0x210 fs/super.c:1400
 f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512
 legacy_get_tree+0x30/0x74 fs/fs_context.c:610
 vfs_get_tree+0x40/0x140 fs/super.c:1530
 do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040
 path_mount+0x358/0x914 fs/namespace.c:3370
 do_mount fs/namespace.c:3383 [inline]
 __do_sys_mount fs/namespace.c:3591 [inline]
 __se_sys_mount fs/namespace.c:3568 [inline]
 __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568</Note>
    </Notes>
    <CVE>CVE-2022-48659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48659.html</URL>
        <Description>CVE-2022-48659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223498</URL>
        <Description>SUSE Bug 1223498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully

When running gpio test on nxp-ls1028 platform with below command
gpiomon --num-events=3 --rising-edge gpiochip1 25
There will be a warning trace as below:
Call trace:
free_irq+0x204/0x360
lineevent_free+0x64/0x70
gpio_ioctl+0x598/0x6a0
__arm64_sys_ioctl+0xb4/0x100
invoke_syscall+0x5c/0x130
......
el0t_64_sync+0x1a0/0x1a4
The reason of this issue is that calling request_threaded_irq()
function failed, and then lineevent_free() is invoked to release
the resource. Since the lineevent_state::irq was already set, so
the subsequent invocation of free_irq() would trigger the above
warning call trace. To fix this issue, set the lineevent_state::irq
after the IRQ register successfully.</Note>
    </Notes>
    <CVE>CVE-2022-48660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48660.html</URL>
        <Description>CVE-2022-48660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223487</URL>
        <Description>SUSE Bug 1223487</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Really move i915_gem_context.link under ref protection

i915_perf assumes that it can use the i915_gem_context reference to
protect its i915-&gt;gem.contexts.list iteration. However, this requires
that we do not remove the context from the list until after we drop the
final reference and release the struct. If, as currently, we remove the
context from the list during context_close(), the link.next pointer may
be poisoned while we are holding the context reference and cause a GPF:

[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff
[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP
[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180
[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017
[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]
[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 &lt;49&gt; 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff
[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202
[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000
[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68
[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc
[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860
[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc
[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000
[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0
[ 4070.575029] Call Trace:
[ 4070.575033]  &lt;TASK&gt;
[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]
[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]
[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]
[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40
[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575290]  drm_ioctl_kernel+0x85/0x110
[ 4070.575296]  ? update_load_avg+0x5f/0x5e0
[ 4070.575302]  drm_ioctl+0x1d3/0x370
[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]
[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0
[ 4070.575451]  ? __do_softirq+0xaa/0x1d2
[ 4070.575456]  do_syscall_64+0x35/0x80
[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 4070.575467] RIP: 0033:0x7f1ed5c10397
[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48
[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397
[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006
[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005
[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a
[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0
[ 4070.575505]  &lt;/TASK&gt;
[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus
---truncated---</Note>
    </Notes>
    <CVE>CVE-2022-48662</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48662.html</URL>
        <Description>CVE-2022-48662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223505</URL>
        <Description>SUSE Bug 1223505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223521</URL>
        <Description>SUSE Bug 1223521</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gpio: mockup: fix NULL pointer dereference when removing debugfs

We now remove the device's debugfs entries when unbinding the driver.
This now causes a NULL-pointer dereference on module exit because the
platform devices are unregistered *after* the global debugfs directory
has been recursively removed. Fix it by unregistering the devices first.</Note>
    </Notes>
    <CVE>CVE-2022-48663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48663.html</URL>
        <Description>CVE-2022-48663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223523</URL>
        <Description>SUSE Bug 1223523</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in insert range

insert range doesn't discard the affected cached region
so can risk temporarily corrupting file data.

Also includes some minor cleanup (avoiding rereading
inode size repeatedly unnecessarily) to make it clearer.</Note>
    </Notes>
    <CVE>CVE-2022-48667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48667.html</URL>
        <Description>CVE-2022-48667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223518</URL>
        <Description>SUSE Bug 1223518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in collapse range

collapse range doesn't discard the affected cached region
so can risk temporarily corrupting the file data. This
fixes xfstest generic/031

I also decided to merge a minor cleanup to this into the same patch
(avoiding rereading inode size repeatedly unnecessarily) to make it
clearer.</Note>
    </Notes>
    <CVE>CVE-2022-48668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48668.html</URL>
        <Description>CVE-2022-48668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223516</URL>
        <Description>SUSE Bug 1223516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()

syzbot is hitting percpu_rwsem_assert_held(&amp;cpu_hotplug_lock) warning at
cpuset_attach() [1], for commit 4f7e7236435ca0ab ("cgroup: Fix
threadgroup_rwsem &lt;-&gt; cpus_read_lock() deadlock") missed that
cpuset_attach() is also called from cgroup_attach_task_all().
Add cpus_read_lock() like what cgroup_procs_write_start() does.</Note>
    </Notes>
    <CVE>CVE-2022-48671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48671.html</URL>
        <Description>CVE-2022-48671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223929</URL>
        <Description>SUSE Bug 1223929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

of: fdt: fix off-by-one error in unflatten_dt_nodes()

Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree")
forgot to fix up the depth check in the loop body in unflatten_dt_nodes()
which makes it possible to overflow the nps[] buffer...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.</Note>
    </Notes>
    <CVE>CVE-2022-48672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48672.html</URL>
        <Description>CVE-2022-48672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223931</URL>
        <Description>SUSE Bug 1223931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix possible access to freed memory in link clear

After modifying the QP to the Error state, all RX WR would be completed
with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not
wait for it is done, but destroy the QP and free the link group directly.
So there is a risk that accessing the freed memory in tasklet context.

Here is a crash example:

 BUG: unable to handle page fault for address: ffffffff8f220860
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060
 Oops: 0002 [#1] SMP PTI
 CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S         OE     5.10.0-0607+ #23
 Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018
 RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0
 Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e &lt;48&gt; 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32
 RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086
 RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000
 RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00
 RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b
 R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010
 R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040
 FS:  0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  _raw_spin_lock_irqsave+0x30/0x40
  mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]
  smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]
  tasklet_action_common.isra.21+0x66/0x100
  __do_softirq+0xd5/0x29c
  asm_call_irq_on_stack+0x12/0x20
  &lt;/IRQ&gt;
  do_softirq_own_stack+0x37/0x40
  irq_exit_rcu+0x9d/0xa0
  sysvec_call_function_single+0x34/0x80
  asm_sysvec_call_function_single+0x12/0x20</Note>
    </Notes>
    <CVE>CVE-2022-48673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48673.html</URL>
        <Description>CVE-2022-48673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223934</URL>
        <Description>SUSE Bug 1223934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223940</URL>
        <Description>SUSE Bug 1223940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

IB/core: Fix a nested dead lock as part of ODP flow

Fix a nested dead lock as part of ODP flow by using mmput_async().

From the below call trace [1] can see that calling mmput() once we have
the umem_odp-&gt;umem_mutex locked as required by
ib_umem_odp_map_dma_and_lock() might trigger in the same task the
exit_mmap()-&gt;__mmu_notifier_release()-&gt;mlx5_ib_invalidate_range() which
may dead lock when trying to lock the same mutex.

Moving to use mmput_async() will solve the problem as the above
exit_mmap() flow will be called in other task and will be executed once
the lock will be available.

[1]
[64843.077665] task:kworker/u133:2  state:D stack:    0 pid:80906 ppid:
2 flags:0x00004000
[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]
[64843.077719] Call Trace:
[64843.077722]  &lt;TASK&gt;
[64843.077724]  __schedule+0x23d/0x590
[64843.077729]  schedule+0x4e/0xb0
[64843.077735]  schedule_preempt_disabled+0xe/0x10
[64843.077740]  __mutex_lock.constprop.0+0x263/0x490
[64843.077747]  __mutex_lock_slowpath+0x13/0x20
[64843.077752]  mutex_lock+0x34/0x40
[64843.077758]  mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]
[64843.077808]  __mmu_notifier_release+0x1a4/0x200
[64843.077816]  exit_mmap+0x1bc/0x200
[64843.077822]  ? walk_page_range+0x9c/0x120
[64843.077828]  ? __cond_resched+0x1a/0x50
[64843.077833]  ? mutex_lock+0x13/0x40
[64843.077839]  ? uprobe_clear_state+0xac/0x120
[64843.077860]  mmput+0x5f/0x140
[64843.077867]  ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]
[64843.077931]  pagefault_real_mr+0x9a/0x140 [mlx5_ib]
[64843.077962]  pagefault_mr+0xb4/0x550 [mlx5_ib]
[64843.077992]  pagefault_single_data_segment.constprop.0+0x2ac/0x560
[mlx5_ib]
[64843.078022]  mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]
[64843.078051]  process_one_work+0x22b/0x3d0
[64843.078059]  worker_thread+0x53/0x410
[64843.078065]  ? process_one_work+0x3d0/0x3d0
[64843.078073]  kthread+0x12a/0x150
[64843.078079]  ? set_kthread_struct+0x50/0x50
[64843.078085]  ret_from_fork+0x22/0x30
[64843.078093]  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2022-48675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48675.html</URL>
        <Description>CVE-2022-48675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223894</URL>
        <Description>SUSE Bug 1223894</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix UAF when detecting digest errors

We should also bail from the io_work loop when we set rd_enabled to true,
so we don't attempt to read data from the socket when the TCP stream is
already out-of-sync or corrupted.</Note>
    </Notes>
    <CVE>CVE-2022-48686</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48686.html</URL>
        <Description>CVE-2022-48686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223948</URL>
        <Description>SUSE Bug 1223948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226337</URL>
        <Description>SUSE Bug 1226337</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix out-of-bounds read when setting HMAC data.

The SRv6 layer allows defining HMAC data that can later be used to sign IPv6
Segment Routing Headers. This configuration is realised via netlink through
four attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and
SEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual
length of the SECRET attribute, it is possible to provide invalid combinations
(e.g., secret = "", secretlen = 64). This case is not checked in the code and
with an appropriately crafted netlink message, an out-of-bounds read of up
to 64 bytes (max secret length) can occur past the skb end pointer and into
skb_shared_info:

Breakpoint 1, seg6_genl_sethmac (skb=&lt;optimized out&gt;, info=&lt;optimized out&gt;) at net/ipv6/seg6.c:208
208		memcpy(hinfo-&gt;secret, secret, slen);
(gdb) bt
 #0  seg6_genl_sethmac (skb=&lt;optimized out&gt;, info=&lt;optimized out&gt;) at net/ipv6/seg6.c:208
 #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,
    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 &lt;init_net&gt;, family=&lt;optimized out&gt;,
    family=&lt;optimized out&gt;) at net/netlink/genetlink.c:731
 #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,
    family=0xffffffff82fef6c0 &lt;seg6_genl_family&gt;) at net/netlink/genetlink.c:775
 #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792
 #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 &lt;genl_rcv_msg&gt;)
    at net/netlink/af_netlink.c:2501
 #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803
 #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)
    at net/netlink/af_netlink.c:1319
 #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=&lt;optimized out&gt;)
    at net/netlink/af_netlink.c:1345
 #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=&lt;optimized out&gt;, msg=0xffffc90000ba7e48, len=&lt;optimized out&gt;) at net/netlink/af_netlink.c:1921
...
(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-&gt;head + ((struct sk_buff *)0xffff88800b1f9f00)-&gt;end
$1 = 0xffff88800b1b76c0
(gdb) p/x secret
$2 = 0xffff88800b1b76c0
(gdb) p slen
$3 = 64 '@'

The OOB data can then be read back from userspace by dumping HMAC state. This
commit fixes this by ensuring SECRETLEN cannot exceed the actual length of
SECRET.</Note>
    </Notes>
    <CVE>CVE-2022-48687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48687.html</URL>
        <Description>CVE-2022-48687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223952</URL>
        <Description>SUSE Bug 1223952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224043</URL>
        <Description>SUSE Bug 1224043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix kernel crash during module removal

The driver incorrectly frees client instance and subsequent
i40e module removal leads to kernel crash.

Reproducer:
1. Do ethtool offline test followed immediately by another one
host# ethtool -t eth0 offline; ethtool -t eth0 offline
2. Remove recursively irdma module that also removes i40e module
host# modprobe -r irdma

Result:
[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110
[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2
[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01
[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1
[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030
[ 8687.768755] #PF: supervisor read access in kernel mode
[ 8687.773895] #PF: error_code(0x0000) - not-present page
[ 8687.779034] PGD 0 P4D 0
[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G        W I        5.19.0+ #2
[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019
[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]
[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb &lt;48&gt; 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b
[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202
[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000
[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000
[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000
[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0
[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008
[ 8687.870342] FS:  00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000
[ 8687.878427] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0
[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 8687.905572] PKRU: 55555554
[ 8687.908286] Call Trace:
[ 8687.910737]  &lt;TASK&gt;
[ 8687.912843]  i40e_remove+0x2c0/0x330 [i40e]
[ 8687.917040]  pci_device_remove+0x33/0xa0
[ 8687.920962]  device_release_driver_internal+0x1aa/0x230
[ 8687.926188]  driver_detach+0x44/0x90
[ 8687.929770]  bus_remove_driver+0x55/0xe0
[ 8687.933693]  pci_unregister_driver+0x2a/0xb0
[ 8687.937967]  i40e_exit_module+0xc/0xf48 [i40e]

Two offline tests cause IRDMA driver failure (ETIMEDOUT) and this
failure is indicated back to i40e_client_subtask() that calls
i40e_client_del_instance() to free client instance referenced
by pf-&gt;cinst and sets this pointer to NULL. During the module
removal i40e_remove() calls i40e_lan_del_device() that dereferences
pf-&gt;cinst that is NULL -&gt; crash.
Do not remove client instance when client open callbacks fails and
just clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs
to take care about this situation (when netdev is up and client
is NOT opened) in i40e_notify_client_of_netdev_close() and
calls client close callback only when __I40E_CLIENT_INSTANCE_OPENED
is set.</Note>
    </Notes>
    <CVE>CVE-2022-48688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48688.html</URL>
        <Description>CVE-2022-48688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223953</URL>
        <Description>SUSE Bug 1223953</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ice: Fix DMA mappings leak

Fix leak, when user changes ring parameters.
During reallocation of RX buffers, new DMA mappings are created for
those buffers. New buffers with different RX ring count should
substitute older ones, but those buffers were freed in ice_vsi_cfg_rxq
and reallocated again with ice_alloc_rx_buf. kfree on rx_buf caused
leak of already mapped DMA.
Reallocate ZC with xdp_buf struct, when BPF program loads. Reallocate
back to rx_buf, when BPF program unloads.
If BPF program is loaded/unloaded and XSK pools are created, reallocate
RX queues accordingly in XDP_SETUP_XSK_POOL handler.

Steps for reproduction:
while :
do
	for ((i=0; i&lt;=8160; i=i+32))
	do
		ethtool -G enp130s0f0 rx $i tx $i
		sleep 0.5
		ethtool -g enp130s0f0
	done
done</Note>
    </Notes>
    <CVE>CVE-2022-48690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48690.html</URL>
        <Description>CVE-2022-48690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223960</URL>
        <Description>SUSE Bug 1223960</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/srp: Set scmnd-&gt;result only when scmnd is not NULL

This change fixes the following kernel NULL pointer dereference
which is reproduced by blktests srp/007 occasionally.

BUG: kernel NULL pointer dereference, address: 0000000000000170
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014
Workqueue:  0x0 (kblockd)
RIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]
Code: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 &lt;41&gt; 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9
RSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282
RAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000
RDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff
RBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001
R10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000
R13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
 __ib_process_cq+0xb7/0x280 [ib_core]
 ib_poll_handler+0x2b/0x130 [ib_core]
 irq_poll_softirq+0x93/0x150
 __do_softirq+0xee/0x4b8
 irq_exit_rcu+0xf7/0x130
 sysvec_apic_timer_interrupt+0x8e/0xc0
 &lt;/IRQ&gt;</Note>
    </Notes>
    <CVE>CVE-2022-48692</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48692.html</URL>
        <Description>CVE-2022-48692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223962</URL>
        <Description>SUSE Bug 1223962</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs

In brcmstb_pm_probe(), there are two kinds of leak bugs:

(1) we need to add of_node_put() when for_each__matching_node() breaks
(2) we need to add iounmap() for each iomap in fail path</Note>
    </Notes>
    <CVE>CVE-2022-48693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48693.html</URL>
        <Description>CVE-2022-48693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223963</URL>
        <Description>SUSE Bug 1223963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix drain SQ hang with no completion

SW generated completions for outstanding WRs posted on SQ
after QP is in error target the wrong CQ. This causes the
ib_drain_sq to hang with no completion.

Fix this to generate completions on the right CQ.

[  863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.
[  863.979224]       Not tainted 5.14.0-130.el9.x86_64 #1
[  863.986588] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  863.996997] task:kworker/u52:2   state:D stack:    0 pid:  671 ppid:     2 flags:0x00004000
[  864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]
[  864.014056] Call Trace:
[  864.017575]  __schedule+0x206/0x580
[  864.022296]  schedule+0x43/0xa0
[  864.026736]  schedule_timeout+0x115/0x150
[  864.032185]  __wait_for_common+0x93/0x1d0
[  864.037717]  ? usleep_range_state+0x90/0x90
[  864.043368]  __ib_drain_sq+0xf6/0x170 [ib_core]
[  864.049371]  ? __rdma_block_iter_next+0x80/0x80 [ib_core]
[  864.056240]  ib_drain_sq+0x66/0x70 [ib_core]
[  864.062003]  rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]
[  864.069365]  ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]
[  864.076386]  xprt_rdma_close+0xe/0x30 [rpcrdma]
[  864.082593]  xprt_autoclose+0x52/0x100 [sunrpc]
[  864.088718]  process_one_work+0x1e8/0x3c0
[  864.094170]  worker_thread+0x50/0x3b0
[  864.099109]  ? rescuer_thread+0x370/0x370
[  864.104473]  kthread+0x149/0x170
[  864.109022]  ? set_kthread_struct+0x40/0x40
[  864.114713]  ret_from_fork+0x22/0x30</Note>
    </Notes>
    <CVE>CVE-2022-48694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48694.html</URL>
        <Description>CVE-2022-48694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223964</URL>
        <Description>SUSE Bug 1223964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix use-after-free warning

Fix the following use-after-free warning which is observed during
controller reset:

refcount_t: underflow; use-after-free.
WARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0</Note>
    </Notes>
    <CVE>CVE-2022-48695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48695.html</URL>
        <Description>CVE-2022-48695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223941</URL>
        <Description>SUSE Bug 1223941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a use-after-free

Fix the following use-after-free complaint triggered by blktests nvme/004:

BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350
Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460
Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]
Call Trace:
 show_stack+0x52/0x58
 dump_stack_lvl+0x49/0x5e
 print_report.cold+0x36/0x1e2
 kasan_report+0xb9/0xf0
 __asan_load4+0x6b/0x80
 blk_mq_complete_request_remote+0xac/0x350
 nvme_loop_queue_response+0x1df/0x275 [nvme_loop]
 __nvmet_req_complete+0x132/0x4f0 [nvmet]
 nvmet_req_complete+0x15/0x40 [nvmet]
 nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]
 nvme_loop_execute_work+0x20/0x30 [nvme_loop]
 process_one_work+0x56e/0xa70
 worker_thread+0x2d1/0x640
 kthread+0x183/0x1c0
 ret_from_fork+0x1f/0x30</Note>
    </Notes>
    <CVE>CVE-2022-48697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48697.html</URL>
        <Description>CVE-2022-48697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223922</URL>
        <Description>SUSE Bug 1223922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix memory leak when using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  Fix this up by properly
calling dput().</Note>
    </Notes>
    <CVE>CVE-2022-48698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48698.html</URL>
        <Description>CVE-2022-48698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223956</URL>
        <Description>SUSE Bug 1223956</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2022-48700</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48700.html</URL>
        <Description>CVE-2022-48700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223957</URL>
        <Description>SUSE Bug 1223957</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()

There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.

Fix this by checking the number of interfaces.</Note>
    </Notes>
    <CVE>CVE-2022-48701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48701.html</URL>
        <Description>CVE-2022-48701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223921</URL>
        <Description>SUSE Bug 1223921</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()

The voice allocator sometimes begins allocating from near the end of the
array and then wraps around, however snd_emu10k1_pcm_channel_alloc()
accesses the newly allocated voices as if it never wrapped around.

This results in out of bounds access if the first voice has a high enough
index so that first_voice + requested_voice_count &gt; NUM_G (64).
The more voices are requested, the more likely it is for this to occur.

This was initially discovered using PipeWire, however it can be reproduced
by calling aplay multiple times with 16 channels:
aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero

UBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40
index 65 is out of range for type 'snd_emu10k1_voice [64]'
CPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7
Hardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x49/0x63
dump_stack+0x10/0x16
ubsan_epilogue+0x9/0x3f
__ubsan_handle_out_of_bounds.cold+0x44/0x49
snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]
snd_pcm_hw_params+0x29f/0x600 [snd_pcm]
snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]
? exit_to_user_mode_prepare+0x35/0x170
? do_syscall_64+0x69/0x90
? syscall_exit_to_user_mode+0x26/0x50
? do_syscall_64+0x69/0x90
? exit_to_user_mode_prepare+0x35/0x170
snd_pcm_ioctl+0x27/0x40 [snd_pcm]
__x64_sys_ioctl+0x95/0xd0
do_syscall_64+0x5c/0x90
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd</Note>
    </Notes>
    <CVE>CVE-2022-48702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48702.html</URL>
        <Description>CVE-2022-48702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223923</URL>
        <Description>SUSE Bug 1223923</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR

In some case, the GDDV returns a package with a buffer which has
zero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).

Then the data_vault_read() got NULL point dereference problem when
accessing the 0x10 value in data_vault.

[   71.024560] BUG: kernel NULL pointer dereference, address:
0000000000000010

This patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or
NULL value in data_vault.</Note>
    </Notes>
    <CVE>CVE-2022-48703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48703.html</URL>
        <Description>CVE-2022-48703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223924</URL>
        <Description>SUSE Bug 1223924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: add a force flush to delay work when radeon

Although radeon card fence and wait for gpu to finish processing current batch rings,
there is still a corner case that radeon lockup work queue may not be fully flushed,
and meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to
put device in D3hot state.
Per PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.
&gt; Configuration and Message requests are the only TLPs accepted by a Function in
&gt; the D3hot state. All other received Requests must be handled as Unsupported Requests,
&gt; and all received Completions may optionally be handled as Unexpected Completions.
This issue will happen in following logs:
Unable to handle kernel paging request at virtual address 00008800e0008010
CPU 0 kworker/0:3(131): Oops 0
pc = [&lt;ffffffff811bea5c&gt;]  ra = [&lt;ffffffff81240844&gt;]  ps = 0000 Tainted: G        W
pc is at si_gpu_check_soft_reset+0x3c/0x240
ra is at si_dma_is_lockup+0x34/0xd0
v0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000
t2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258
t5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000
s0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018
s3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000
s6 = fff00007ef07bd98
a0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008
a3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338
t8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800
t11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000
gp = ffffffff81d89690  sp = 00000000aa814126
Disabling lock debugging due to kernel taint
Trace:
[&lt;ffffffff81240844&gt;] si_dma_is_lockup+0x34/0xd0
[&lt;ffffffff81119610&gt;] radeon_fence_check_lockup+0xd0/0x290
[&lt;ffffffff80977010&gt;] process_one_work+0x280/0x550
[&lt;ffffffff80977350&gt;] worker_thread+0x70/0x7c0
[&lt;ffffffff80977410&gt;] worker_thread+0x130/0x7c0
[&lt;ffffffff80982040&gt;] kthread+0x200/0x210
[&lt;ffffffff809772e0&gt;] worker_thread+0x0/0x7c0
[&lt;ffffffff80981f8c&gt;] kthread+0x14c/0x210
[&lt;ffffffff80911658&gt;] ret_from_kernel_thread+0x18/0x20
[&lt;ffffffff80981e40&gt;] kthread+0x0/0x210
 Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101
 &lt;88210000&gt; 4821ed21
So force lockup work queue flush to fix this problem.</Note>
    </Notes>
    <CVE>CVE-2022-48704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48704.html</URL>
        <Description>CVE-2022-48704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223932</URL>
        <Description>SUSE Bug 1223932</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.</Note>
    </Notes>
    <CVE>CVE-2023-2860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2860.html</URL>
        <Description>CVE-2023-2860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211592</URL>
        <Description>SUSE Bug 1211592</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO

The SC16IS7XX IC supports a burst mode to access the FIFOs where the
initial register address is sent ($00), followed by all the FIFO data
without having to resend the register address each time. In this mode, the
IC doesn't increment the register address for each R/W byte.

The regmap_raw_read() and regmap_raw_write() are functions which can
perform IO over multiple registers. They are currently used to read/write
from/to the FIFO, and although they operate correctly in this burst mode on
the SPI bus, they would corrupt the regmap cache if it was not disabled
manually. The reason is that when the R/W size is more than 1 byte, these
functions assume that the register address is incremented and handle the
cache accordingly.

Convert FIFO R/W functions to use the regmap _noinc_ versions in order to
remove the manual cache control which was a workaround when using the
_raw_ versions. FIFO registers are properly declared as volatile so
cache will not be used/updated for FIFO accesses.</Note>
    </Notes>
    <CVE>CVE-2023-52488</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52488.html</URL>
        <Description>CVE-2023-52488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221162</URL>
        <Description>SUSE Bug 1221162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tee: amdtee: fix use-after-free vulnerability in amdtee_close_session

There is a potential race condition in amdtee_close_session that may
cause use-after-free in amdtee_open_session. For instance, if a session
has refcount == 1, and one thread tries to free this session via:

    kref_put(&amp;sess-&gt;refcount, destroy_session);

the reference count will get decremented, and the next step would be to
call destroy_session(). However, if in another thread,
amdtee_open_session() is called before destroy_session() has completed
execution, alloc_session() may return 'sess' that will be freed up
later in destroy_session() leading to use-after-free in
amdtee_open_session.

To fix this issue, treat decrement of sess-&gt;refcount and removal of
'sess' from session list in destroy_session() as a critical section, so
that it is executed atomically.</Note>
    </Notes>
    <CVE>CVE-2023-52503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52503.html</URL>
        <Description>CVE-2023-52503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220915</URL>
        <Description>SUSE Bug 1220915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved

Adding a reserved memory region for the framebuffer memory
(the splash memory region set up by the bootloader).

It fixes a kernel panic (arm-smmu: Unhandled context fault
at this particular memory region) reported on DB845c running
v5.10.y.</Note>
    </Notes>
    <CVE>CVE-2023-52561</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52561.html</URL>
        <Description>CVE-2023-52561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220935</URL>
        <Description>SUSE Bug 1220935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()

Return invalid error code -EINVAL for invalid block id.

Fixes the below:

drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' could be null (see line 1176)</Note>
    </Notes>
    <CVE>CVE-2023-52585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52585.html</URL>
        <Description>CVE-2023-52585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221080</URL>
        <Description>SUSE Bug 1221080</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: rkisp1: Fix IRQ disable race issue

In rkisp1_isp_stop() and rkisp1_csi_disable() the driver masks the
interrupts and then apparently assumes that the interrupt handler won't
be running, and proceeds in the stop procedure. This is not the case, as
the interrupt handler can already be running, which would lead to the
ISP being disabled while the interrupt handler handling a captured
frame.

This brings up two issues: 1) the ISP could be powered off while the
interrupt handler is still running and accessing registers, leading to
board lockup, and 2) the interrupt handler code and the code that
disables the streaming might do things that conflict.

It is not clear to me if 2) causes a real issue, but 1) can be seen with
a suitable delay (or printk in my case) in the interrupt handler,
leading to board lockup.</Note>
    </Notes>
    <CVE>CVE-2023-52589</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52589.html</URL>
        <Description>CVE-2023-52589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221084</URL>
        <Description>SUSE Bug 1221084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change ocfs2 rename code to avoid touching renamed directory if
its parent does not change as without locking that can corrupt the
filesystem.</Note>
    </Notes>
    <CVE>CVE-2023-52590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52590.html</URL>
        <Description>CVE-2023-52590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221088</URL>
        <Description>SUSE Bug 1221088</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

reiserfs: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change reiserfs rename code to avoid touching renamed directory
if its parent does not change as without locking that can corrupt the
filesystem.</Note>
    </Notes>
    <CVE>CVE-2023-52591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52591.html</URL>
        <Description>CVE-2023-52591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221044</URL>
        <Description>SUSE Bug 1221044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221578</URL>
        <Description>SUSE Bug 1221578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221598</URL>
        <Description>SUSE Bug 1221598</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()

Since 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()'
should check the return value before examining skb data. So convert
the latter to return an appropriate error code and propagate it to
return from 'wfx_start_ap()' as well. Compile tested only.</Note>
    </Notes>
    <CVE>CVE-2023-52593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52593.html</URL>
        <Description>CVE-2023-52593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221042</URL>
        <Description>SUSE Bug 1221042</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Fix buffer overflow in trans_stat_show

Fix buffer overflow in trans_stat_show().

Convert simple snprintf to the more secure scnprintf with size of
PAGE_SIZE.

Add condition checking if we are exceeding PAGE_SIZE and exit early from
loop. Also add at the end a warning that we exceeded PAGE_SIZE and that
stats is disabled.

Return -EFBIG in the case where we don't have enough space to write the
full transition table.

Also document in the ABI that this function can return -EFBIG error.</Note>
    </Notes>
    <CVE>CVE-2023-52614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52614.html</URL>
        <Description>CVE-2023-52614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221617</URL>
        <Description>SUSE Bug 1221617</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init

When the mpi_ec_ctx structure is initialized, some fields are not
cleared, causing a crash when referencing the field when the
structure was released. Initially, this issue was ignored because
memory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.
For example, this error will be triggered when calculating the
Za value for SM2 separately.</Note>
    </Notes>
    <CVE>CVE-2023-52616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52616.html</URL>
        <Description>CVE-2023-52616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221612</URL>
        <Description>SUSE Bug 1221612</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow timeout for anonymous sets

Never used from userspace, disallow these parameters.</Note>
    </Notes>
    <CVE>CVE-2023-52620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52620.html</URL>
        <Description>CVE-2023-52620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221825</URL>
        <Description>SUSE Bug 1221825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7091r: Allow users to configure device events

AD7091R-5 devices are supported by the ad7091r-5 driver together with
the ad7091r-base driver. Those drivers declared iio events for notifying
user space when ADC readings fall bellow the thresholds of low limit
registers or above the values set in high limit registers.
However, to configure iio events and their thresholds, a set of callback
functions must be implemented and those were not present until now.
The consequence of trying to configure ad7091r-5 events without the
proper callback functions was a null pointer dereference in the kernel
because the pointers to the callback functions were not set.

Implement event configuration callbacks allowing users to read/write
event thresholds and enable/disable event generation.

Since the event spec structs are generic to AD7091R devices, also move
those from the ad7091r-5 driver the base driver so they can be reused
when support for ad7091r-2/-4/-8 be added.</Note>
    </Notes>
    <CVE>CVE-2023-52627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52627.html</URL>
        <Description>CVE-2023-52627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222051</URL>
        <Description>SUSE Bug 1222051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Synchronize devfreq_monitor_[start/stop]

There is a chance if a frequent switch of the governor
done in a loop result in timer list corruption where
timer cancel being done from two place one from
cancel_delayed_work_sync() and followed by expire_timers()
can be seen from the traces[1].

while true
do
        echo "simple_ondemand" &gt; /sys/class/devfreq/1d84000.ufshc/governor
        echo "performance" &gt; /sys/class/devfreq/1d84000.ufshc/governor
done

It looks to be issue with devfreq driver where
device_monitor_[start/stop] need to synchronized so that
delayed work should get corrupted while it is either
being queued or running or being cancelled.

Let's use polling flag and devfreq lock to synchronize the
queueing the timer instance twice and work data being
corrupted.

[1]
...
..
&lt;idle&gt;-0    [003]   9436.209662:  timer_cancel   timer=0xffffff80444f0428
&lt;idle&gt;-0    [003]   9436.209664:  timer_expire_entry   timer=0xffffff80444f0428  now=0x10022da1c  function=__typeid__ZTSFvP10timer_listE_global_addr  baseclk=0x10022da1c
&lt;idle&gt;-0    [003]   9436.209718:  timer_expire_exit   timer=0xffffff80444f0428
kworker/u16:6-14217    [003]   9436.209863:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2b  now=0x10022da1c  flags=182452227
vendor.xxxyyy.ha-1593    [004]   9436.209888:  timer_cancel   timer=0xffffff80444f0428
vendor.xxxyyy.ha-1593    [004]   9436.216390:  timer_init   timer=0xffffff80444f0428
vendor.xxxyyy.ha-1593    [004]   9436.216392:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2c  now=0x10022da1d  flags=186646532
vendor.xxxyyy.ha-1593    [005]   9436.220992:  timer_cancel   timer=0xffffff80444f0428
xxxyyyTraceManag-7795    [004]   9436.261641:  timer_cancel   timer=0xffffff80444f0428

[2]

 9436.261653][    C4] Unable to handle kernel paging request at virtual address dead00000000012a
[ 9436.261664][    C4] Mem abort info:
[ 9436.261666][    C4]   ESR = 0x96000044
[ 9436.261669][    C4]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 9436.261671][    C4]   SET = 0, FnV = 0
[ 9436.261673][    C4]   EA = 0, S1PTW = 0
[ 9436.261675][    C4] Data abort info:
[ 9436.261677][    C4]   ISV = 0, ISS = 0x00000044
[ 9436.261680][    C4]   CM = 0, WnR = 1
[ 9436.261682][    C4] [dead00000000012a] address between user and kernel address ranges
[ 9436.261685][    C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[ 9436.261701][    C4] Skip md ftrace buffer dump for: 0x3a982d0
...

[ 9436.262138][    C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G S      W  O      5.10.149-android12-9-o-g17f915d29d0c #1
[ 9436.262141][    C4] Hardware name: Qualcomm Technologies, Inc.  (DT)
[ 9436.262144][    C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--)
[ 9436.262161][    C4] pc : expire_timers+0x9c/0x438
[ 9436.262164][    C4] lr : expire_timers+0x2a4/0x438
[ 9436.262168][    C4] sp : ffffffc010023dd0
[ 9436.262171][    C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18
[ 9436.262178][    C4] x27: ffffffd063569dd0 x26: ffffffd063536008
[ 9436.262182][    C4] x25: 0000000000000001 x24: ffffff88f7c69280
[ 9436.262185][    C4] x23: 00000000000000e0 x22: dead000000000122
[ 9436.262188][    C4] x21: 000000010022da29 x20: ffffff8af72b4e80
[ 9436.262191][    C4] x19: ffffffc010023e50 x18: ffffffc010025038
[ 9436.262195][    C4] x17: 0000000000000240 x16: 0000000000000201
[ 9436.262199][    C4] x15: ffffffffffffffff x14: ffffff889f3c3100
[ 9436.262203][    C4] x13: ffffff889f3c3100 x12: 00000000049f56b8
[ 9436.262207][    C4] x11: 00000000049f56b8 x10: 00000000ffffffff
[ 9436.262212][    C4] x9 : ffffffc010023e50 x8 : dead000000000122
[ 9436.262216][    C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8
[ 9436.262220][    C4] x5 : 0000000000000000 x4 : 0000000000000101
[ 9436.262223][    C4] x3 : 0000000000000080 x2 : ffffff8
---truncated---</Note>
    </Notes>
    <CVE>CVE-2023-52635</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52635.html</URL>
        <Description>CVE-2023-52635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222294</URL>
        <Description>SUSE Bug 1222294</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

libceph: just wait for more data to be available on the socket

A short read may occur while reading the message footer from the
socket.  Later, when the socket is ready for another read, the
messenger invokes all read_partial_*() handlers, including
read_partial_sparse_msg_data().  The expectation is that
read_partial_sparse_msg_data() would bail, allowing the messenger to
invoke read_partial() for the footer and pick up where it left off.

However read_partial_sparse_msg_data() violates that and ends up
calling into the state machine in the OSD client.  The sparse-read
state machine assumes that it's a new op and interprets some piece of
the footer as the sparse-read header and returns bogus extents/data
length, etc.

To determine whether read_partial_sparse_msg_data() should bail, let's
reuse cursor-&gt;total_resid.  Because once it reaches to zero that means
all the extents and data have been successfully received in last read,
else it could break out when partially reading any of the extents and
data.  And then osd_sparse_read() could continue where it left off.

[ idryomov: changelog ]</Note>
    </Notes>
    <CVE>CVE-2023-52636</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52636.html</URL>
        <Description>CVE-2023-52636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222247</URL>
        <Description>SUSE Bug 1222247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pmdomain: mediatek: fix race conditions with genpd

If the power domains are registered first with genpd and *after that*
the driver attempts to power them on in the probe sequence, then it is
possible that a race condition occurs if genpd tries to power them on
in the same time.
The same is valid for powering them off before unregistering them
from genpd.
Attempt to fix race conditions by first removing the domains from genpd
and *after that* powering down domains.
Also first power up the domains and *after that* register them
to genpd.</Note>
    </Notes>
    <CVE>CVE-2023-52645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52645.html</URL>
        <Description>CVE-2023-52645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223033</URL>
        <Description>SUSE Bug 1223033</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NTB: fix possible name leak in ntb_register_device()

If device_register() fails in ntb_register_device(), the device name
allocated by dev_set_name() should be freed. As per the comment in
device_register(), callers should use put_device() to give up the
reference in the error path. So fix this by calling put_device() in the
error path so that the name can be freed in kobject_cleanup().

As a result of this, put_device() in the error path of
ntb_register_device() is removed and the actual error is returned.

[mani: reworded commit message]</Note>
    </Notes>
    <CVE>CVE-2023-52652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52652.html</URL>
        <Description>CVE-2023-52652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223686</URL>
        <Description>SUSE Bug 1223686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.</Note>
    </Notes>
    <CVE>CVE-2023-6270</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-6270.html</URL>
        <Description>CVE-2023-6270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218562</URL>
        <Description>SUSE Bug 1218562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218813</URL>
        <Description>SUSE Bug 1218813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221578</URL>
        <Description>SUSE Bug 1221578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221598</URL>
        <Description>SUSE Bug 1221598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223016</URL>
        <Description>SUSE Bug 1223016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227675</URL>
        <Description>SUSE Bug 1227675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel's SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.</Note>
    </Notes>
    <CVE>CVE-2024-0639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0639.html</URL>
        <Description>CVE-2024-0639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218917</URL>
        <Description>SUSE Bug 1218917</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2024-0841</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0841.html</URL>
        <Description>CVE-2024-0841</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219264</URL>
        <Description>SUSE Bug 1219264</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.

This issue affects Linux kernel: v2.6.12-rc2.

</Note>
    </Notes>
    <CVE>CVE-2024-22099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22099.html</URL>
        <Description>CVE-2024-22099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219170</URL>
        <Description>SUSE Bug 1219170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.</Note>
    </Notes>
    <CVE>CVE-2024-23307</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-23307.html</URL>
        <Description>CVE-2024-23307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219169</URL>
        <Description>SUSE Bug 1219169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220145</URL>
        <Description>SUSE Bug 1220145</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.</Note>
    </Notes>
    <CVE>CVE-2024-23848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-23848.html</URL>
        <Description>CVE-2024-23848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219104</URL>
        <Description>SUSE Bug 1219104</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.</Note>
    </Notes>
    <CVE>CVE-2024-23850</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-23850.html</URL>
        <Description>CVE-2024-23850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219126</URL>
        <Description>SUSE Bug 1219126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: regenerate buddy after block freeing failed if under fc replay

This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant
mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on
code in mb_free_blocks(), fast commit replay can end up marking as free
blocks that are already marked as such. This causes corruption of the
buddy bitmap so we need to regenerate it in that case.</Note>
    </Notes>
    <CVE>CVE-2024-26601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26601.html</URL>
        <Description>CVE-2024-26601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220342</URL>
        <Description>SUSE Bug 1220342</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fix a memory corruption

iwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that
if we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in
bytes, we'll write past the buffer.</Note>
    </Notes>
    <CVE>CVE-2024-26610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26610.html</URL>
        <Description>CVE-2024-26610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221299</URL>
        <Description>SUSE Bug 1221299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221302</URL>
        <Description>SUSE Bug 1221302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix use-after-free bug

The bug can be triggered by sending a single amdgpu_gem_userptr_ioctl
to the AMDGPU DRM driver on any ASICs with an invalid address and size.
The bug was reported by Joonkyo Jung &lt;joonkyoj@yonsei.ac.kr&gt;.
For example the following code:

static void Syzkaller1(int fd)
{
	struct drm_amdgpu_gem_userptr arg;
	int ret;

	arg.addr = 0xffffffffffff0000;
	arg.size = 0x80000000; /*2 Gb*/
	arg.flags = 0x7;
	ret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, &amp;arg);
}

Due to the address and size are not valid there is a failure in
amdgpu_hmm_register-&gt;mmu_interval_notifier_insert-&gt;__mmu_interval_notifier_insert-&gt;
check_shl_overflow, but we even the amdgpu_hmm_register failure we still call
amdgpu_hmm_unregister into  amdgpu_gem_object_free which causes access to a bad address.
The following stack is below when the issue is reproduced when Kazan is enabled:

[  +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340
[  +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff &lt;0f&gt; 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80
[  +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246
[  +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b
[  +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260
[  +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25
[  +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00
[  +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260
[  +0.000011] FS:  00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000
[  +0.000012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0
[  +0.000010] Call Trace:
[  +0.000006]  &lt;TASK&gt;
[  +0.000007]  ? show_regs+0x6a/0x80
[  +0.000018]  ? __warn+0xa5/0x1b0
[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340
[  +0.000018]  ? report_bug+0x24a/0x290
[  +0.000022]  ? handle_bug+0x46/0x90
[  +0.000015]  ? exc_invalid_op+0x19/0x50
[  +0.000016]  ? asm_exc_invalid_op+0x1b/0x20
[  +0.000017]  ? kasan_save_stack+0x26/0x50
[  +0.000017]  ? mmu_interval_notifier_remove+0x23b/0x340
[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340
[  +0.000019]  ? mmu_interval_notifier_remove+0x23b/0x340
[  +0.000020]  ? __pfx_mmu_interval_notifier_remove+0x10/0x10
[  +0.000017]  ? kasan_save_alloc_info+0x1e/0x30
[  +0.000018]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __kasan_kmalloc+0xb1/0xc0
[  +0.000018]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_read+0x11/0x20
[  +0.000020]  amdgpu_hmm_unregister+0x34/0x50 [amdgpu]
[  +0.004695]  amdgpu_gem_object_free+0x66/0xa0 [amdgpu]
[  +0.004534]  ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]
[  +0.004291]  ? do_syscall_64+0x5f/0xe0
[  +0.000023]  ? srso_return_thunk+0x5/0x5f
[  +0.000017]  drm_gem_object_free+0x3b/0x50 [drm]
[  +0.000489]  amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]
[  +0.004295]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004270]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __this_cpu_preempt_check+0x13/0x20
[  +0.000015]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? sysvec_apic_timer_interrupt+0x57/0xc0
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  +0.000022]  ? drm_ioctl_kernel+0x17b/0x1f0 [drm]
[  +0.000496]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004272]  ? drm_ioctl_kernel+0x190/0x1f0 [drm]
[  +0.000492]  drm_ioctl_kernel+0x140/0x1f0 [drm]
[  +0.000497]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004297]  ? __pfx_drm_ioctl_kernel+0x10/0x10 [d
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26656.html</URL>
        <Description>CVE-2024-26656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222307</URL>
        <Description>SUSE Bug 1222307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Implement bounds check for stream encoder creation in DCN301

'stream_enc_regs' array is an array of dcn10_stream_enc_registers
structures. The array is initialized with four elements, corresponding
to the four calls to stream_enc_regs() in the array initializer. This
means that valid indices for this array are 0, 1, 2, and 3.

The error message 'stream_enc_regs' 4 &lt;= 5 below, is indicating that
there is an attempt to access this array with an index of 5, which is
out of bounds. This could lead to undefined behavior

Here, eng_id is used as an index to access the stream_enc_regs array. If
eng_id is 5, this would result in an out-of-bounds access on the
stream_enc_regs array.

Thus fixing Buffer overflow error in dcn301_stream_encoder_create
reported by Smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 &lt;= 5</Note>
    </Notes>
    <CVE>CVE-2024-26660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26660.html</URL>
        <Description>CVE-2024-26660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222266</URL>
        <Description>SUSE Bug 1222266</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix IO hang from sbitmap wakeup race

In blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered
with the following blk_mq_get_driver_tag() in case of getting driver
tag failure.

Then in __sbitmap_queue_wake_up(), waitqueue_active() may not observe
the added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime
blk_mq_mark_tag_wait() can't get driver tag successfully.

This issue can be reproduced by running the following test in loop, and
fio hang can be observed in &lt; 30min when running it on my test VM
in laptop.

	modprobe -r scsi_debug
	modprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4
	dev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`
	fio --filename=/dev/"$dev" --direct=1 --rw=randrw --bs=4k --iodepth=1 \
       		--runtime=100 --numjobs=40 --time_based --name=test \
        	--ioengine=libaio

Fix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which
is just fine in case of running out of tag.</Note>
    </Notes>
    <CVE>CVE-2024-26671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26671.html</URL>
        <Description>CVE-2024-26671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222357</URL>
        <Description>SUSE Bug 1222357</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations

- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.
- Disallow layer 4 protocol with no ports, since destination port is a
  mandatory attribute for this object.</Note>
    </Notes>
    <CVE>CVE-2024-26673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26673.html</URL>
        <Description>CVE-2024-26673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222368</URL>
        <Description>SUSE Bug 1222368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ppp_async: limit MRU to 64K

syzbot triggered a warning [1] in __alloc_pages():

WARN_ON_ONCE_GFP(order &gt; MAX_PAGE_ORDER, gfp)

Willem fixed a similar issue in commit c0a2a1b0d631 ("ppp: limit MRU to 64K")

Adopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)

[1]:

 WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
Modules linked in:
CPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Workqueue: events_unbound flush_to_ldisc
pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
 lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537
sp : ffff800093967580
x29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000
x26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0
x23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8
x20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120
x17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005
x14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000
x11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001
x8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f
x5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020
x2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0
Call trace:
  __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
  __alloc_pages_node include/linux/gfp.h:238 [inline]
  alloc_pages_node include/linux/gfp.h:261 [inline]
  __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926
  __do_kmalloc_node mm/slub.c:3969 [inline]
  __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001
  kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590
  __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651
  __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715
  netdev_alloc_skb include/linux/skbuff.h:3235 [inline]
  dev_alloc_skb include/linux/skbuff.h:3248 [inline]
  ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]
  ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341
  tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390
  tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37
  receive_buf drivers/tty/tty_buffer.c:444 [inline]
  flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494
  process_one_work+0x694/0x1204 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x938/0xef4 kernel/workqueue.c:2787
  kthread+0x288/0x310 kernel/kthread.c:388
  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860</Note>
    </Notes>
    <CVE>CVE-2024-26675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26675.html</URL>
        <Description>CVE-2024-26675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222379</URL>
        <Description>SUSE Bug 1222379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: Fix DMA mapping for PTP hwts ring

Function aq_ring_hwts_rx_alloc() maps extra AQ_CFG_RXDS_DEF bytes
for PTP HWTS ring but then generic aq_ring_free() does not take this
into account.
Create and use a specific function to free HWTS ring to fix this
issue.

Trace:
[  215.351607] ------------[ cut here ]------------
[  215.351612] DMA-API: atlantic 0000:4b:00.0: device driver frees DMA memory with different size [device address=0x00000000fbdd0000] [map size=34816 bytes] [unmap size=32768 bytes]
[  215.351635] WARNING: CPU: 33 PID: 10759 at kernel/dma/debug.c:988 check_unmap+0xa6f/0x2360
...
[  215.581176] Call Trace:
[  215.583632]  &lt;TASK&gt;
[  215.585745]  ? show_trace_log_lvl+0x1c4/0x2df
[  215.590114]  ? show_trace_log_lvl+0x1c4/0x2df
[  215.594497]  ? debug_dma_free_coherent+0x196/0x210
[  215.599305]  ? check_unmap+0xa6f/0x2360
[  215.603147]  ? __warn+0xca/0x1d0
[  215.606391]  ? check_unmap+0xa6f/0x2360
[  215.610237]  ? report_bug+0x1ef/0x370
[  215.613921]  ? handle_bug+0x3c/0x70
[  215.617423]  ? exc_invalid_op+0x14/0x50
[  215.621269]  ? asm_exc_invalid_op+0x16/0x20
[  215.625480]  ? check_unmap+0xa6f/0x2360
[  215.629331]  ? mark_lock.part.0+0xca/0xa40
[  215.633445]  debug_dma_free_coherent+0x196/0x210
[  215.638079]  ? __pfx_debug_dma_free_coherent+0x10/0x10
[  215.643242]  ? slab_free_freelist_hook+0x11d/0x1d0
[  215.648060]  dma_free_attrs+0x6d/0x130
[  215.651834]  aq_ring_free+0x193/0x290 [atlantic]
[  215.656487]  aq_ptp_ring_free+0x67/0x110 [atlantic]
...
[  216.127540] ---[ end trace 6467e5964dd2640b ]---
[  216.132160] DMA-API: Mapped at:
[  216.132162]  debug_dma_alloc_coherent+0x66/0x2f0
[  216.132165]  dma_alloc_attrs+0xf5/0x1b0
[  216.132168]  aq_ring_hwts_rx_alloc+0x150/0x1f0 [atlantic]
[  216.132193]  aq_ptp_ring_alloc+0x1bb/0x540 [atlantic]
[  216.132213]  aq_nic_init+0x4a1/0x760 [atlantic]</Note>
    </Notes>
    <CVE>CVE-2024-26680</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26680.html</URL>
        <Description>CVE-2024-26680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222427</URL>
        <Description>SUSE Bug 1222427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netdevsim: avoid potential loop in nsim_dev_trap_report_work()

Many syzbot reports include the following trace [1]

If nsim_dev_trap_report_work() can not grab the mutex,
it should rearm itself at least one jiffie later.

[1]
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 32383 Comm: kworker/0:2 Not tainted 6.8.0-rc2-syzkaller-00031-g861c0981648f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Workqueue: events nsim_dev_trap_report_work
 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:89 [inline]
 RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline]
 RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]
 RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline]
 RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
 RIP: 0010:kasan_check_range+0x101/0x190 mm/kasan/generic.c:189
Code: 07 49 39 d1 75 0a 45 3a 11 b8 01 00 00 00 7c 0b 44 89 c2 e8 21 ed ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 &lt;48&gt; 83 c0 01 48 39 d0 74 41 80 38 00 74 f2 eb b6 41 bc 08 00 00 00
RSP: 0018:ffffc90012dcf998 EFLAGS: 00000046
RAX: fffffbfff258af1e RBX: fffffbfff258af1f RCX: ffffffff8168eda3
RDX: fffffbfff258af1f RSI: 0000000000000004 RDI: ffffffff92c578f0
RBP: fffffbfff258af1e R08: 0000000000000000 R09: fffffbfff258af1e
R10: ffffffff92c578f3 R11: ffffffff8acbcbc0 R12: 0000000000000002
R13: ffff88806db38400 R14: 1ffff920025b9f42 R15: ffffffff92c578e8
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c00994e078 CR3: 000000002c250000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
  instrument_atomic_read include/linux/instrumented.h:68 [inline]
  atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline]
  queued_spin_is_locked include/asm-generic/qspinlock.h:57 [inline]
  debug_spin_unlock kernel/locking/spinlock_debug.c:101 [inline]
  do_raw_spin_unlock+0x53/0x230 kernel/locking/spinlock_debug.c:141
  __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:150 [inline]
  _raw_spin_unlock_irqrestore+0x22/0x70 kernel/locking/spinlock.c:194
  debug_object_activate+0x349/0x540 lib/debugobjects.c:726
  debug_work_activate kernel/workqueue.c:578 [inline]
  insert_work+0x30/0x230 kernel/workqueue.c:1650
  __queue_work+0x62e/0x11d0 kernel/workqueue.c:1802
  __queue_delayed_work+0x1bf/0x270 kernel/workqueue.c:1953
  queue_delayed_work_on+0x106/0x130 kernel/workqueue.c:1989
  queue_delayed_work include/linux/workqueue.h:563 [inline]
  schedule_delayed_work include/linux/workqueue.h:677 [inline]
  nsim_dev_trap_report_work+0x9c0/0xc80 drivers/net/netdevsim/dev.c:842
  process_one_work+0x886/0x15d0 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x8b9/0x1290 kernel/workqueue.c:2787
  kthread+0x2c6/0x3a0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-26681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26681.html</URL>
        <Description>CVE-2024-26681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222431</URL>
        <Description>SUSE Bug 1222431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: xgmac: fix handling of DPP safety error for DMA channels

Commit 56e58d6c8a56 ("net: stmmac: Implement Safety Features in
XGMAC core") checks and reports safety errors, but leaves the
Data Path Parity Errors for each channel in DMA unhandled at all, lead to
a storm of interrupt.
Fix it by checking and clearing the DMA_DPP_Interrupt_Status register.</Note>
    </Notes>
    <CVE>CVE-2024-26684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26684.html</URL>
        <Description>CVE-2024-26684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222445</URL>
        <Description>SUSE Bug 1222445</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential bug in end_buffer_async_write

According to a syzbot report, end_buffer_async_write(), which handles the
completion of block device writes, may detect abnormal condition of the
buffer async_write flag and cause a BUG_ON failure when using nilfs2.

Nilfs2 itself does not use end_buffer_async_write().  But, the async_write
flag is now used as a marker by commit 7f42ec394156 ("nilfs2: fix issue
with race condition of competition between segments for dirty blocks") as
a means of resolving double list insertion of dirty blocks in
nilfs_lookup_dirty_data_buffers() and nilfs_lookup_node_buffers() and the
resulting crash.

This modification is safe as long as it is used for file data and b-tree
node blocks where the page caches are independent.  However, it was
irrelevant and redundant to also introduce async_write for segment summary
and super root blocks that share buffers with the backing device.  This
led to the possibility that the BUG_ON check in end_buffer_async_write
would fail as described above, if independent writebacks of the backing
device occurred in parallel.

The use of async_write for segment summary buffers has already been
removed in a previous change.

Fix this issue by removing the manipulation of the async_write flag for
the remaining super root block buffer.</Note>
    </Notes>
    <CVE>CVE-2024-26685</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26685.html</URL>
        <Description>CVE-2024-26685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222437</URL>
        <Description>SUSE Bug 1222437</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xen/events: close evtchn after mapping cleanup

shutdown_pirq and startup_pirq are not taking the
irq_mapping_update_lock because they can't due to lock inversion. Both
are called with the irq_desc-&gt;lock being taking. The lock order,
however, is first irq_mapping_update_lock and then irq_desc-&gt;lock.

This opens multiple races:
- shutdown_pirq can be interrupted by a function that allocates an event
  channel:

  CPU0                        CPU1
  shutdown_pirq {
    xen_evtchn_close(e)
                              __startup_pirq {
                                EVTCHNOP_bind_pirq
                                  -&gt; returns just freed evtchn e
                                set_evtchn_to_irq(e, irq)
                              }
    xen_irq_info_cleanup() {
      set_evtchn_to_irq(e, -1)
    }
  }

  Assume here event channel e refers here to the same event channel
  number.
  After this race the evtchn_to_irq mapping for e is invalid (-1).

- __startup_pirq races with __unbind_from_irq in a similar way. Because
  __startup_pirq doesn't take irq_mapping_update_lock it can grab the
  evtchn that __unbind_from_irq is currently freeing and cleaning up. In
  this case even though the event channel is allocated, its mapping can
  be unset in evtchn_to_irq.

The fix is to first cleanup the mappings and then close the event
channel. In this way, when an event channel gets allocated it's
potential previous evtchn_to_irq mappings are guaranteed to be unset already.
This is also the reverse order of the allocation where first the event
channel is allocated and then the mappings are setup.

On a 5.10 kernel prior to commit 3fcdaf3d7634 ("xen/events: modify internal
[un]bind interfaces"), we hit a BUG like the following during probing of NVMe
devices. The issue is that during nvme_setup_io_queues, pci_free_irq
is called for every device which results in a call to shutdown_pirq.
With many nvme devices it's therefore likely to hit this race during
boot because there will be multiple calls to shutdown_pirq and
startup_pirq are running potentially in parallel.

  ------------[ cut here ]------------
  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled
  kernel BUG at drivers/xen/events/events_base.c:499!
  invalid opcode: 0000 [#1] SMP PTI
  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1
  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006
  Workqueue: nvme-reset-wq nvme_reset_work
  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0
  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff &lt;0f&gt; 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00
  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006
  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff
  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00
  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed
  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002
  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? set_affinity_irq+0xdc/0x1c0
   ? __die_body.cold+0x8/0xd
   ? die+0x2b/0x50
   ? do_trap+0x90/0x110
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? do_error_trap+0x65/0x80
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? exc_invalid_op+0x4e/0x70
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? asm_exc_invalid_op+0x12/0x20
   ? bind_evtchn_to_cpu+0xdf/0x
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26687.html</URL>
        <Description>CVE-2024-26687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222435</URL>
        <Description>SUSE Bug 1222435</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super

When configuring a hugetlb filesystem via the fsconfig() syscall, there is
a possible NULL dereference in hugetlbfs_fill_super() caused by assigning
NULL to ctx-&gt;hstate in hugetlbfs_parse_param() when the requested pagesize
is non valid.

E.g: Taking the following steps:

     fd = fsopen("hugetlbfs", FSOPEN_CLOEXEC);
     fsconfig(fd, FSCONFIG_SET_STRING, "pagesize", "1024", 0);
     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);

Given that the requested "pagesize" is invalid, ctxt-&gt;hstate will be replaced
with NULL, losing its previous value, and we will print an error:

 ...
 ...
 case Opt_pagesize:
 ps = memparse(param-&gt;string, &amp;rest);
 ctx-&gt;hstate = h;
 if (!ctx-&gt;hstate) {
         pr_err("Unsupported page size %lu MB\n", ps / SZ_1M);
         return -EINVAL;
 }
 return 0;
 ...
 ...

This is a problem because later on, we will dereference ctxt-&gt;hstate in
hugetlbfs_fill_super()

 ...
 ...
 sb-&gt;s_blocksize = huge_page_size(ctx-&gt;hstate);
 ...
 ...

Causing below Oops.

Fix this by replacing cxt-&gt;hstate value only when then pagesize is known
to be valid.

 kernel: hugetlbfs: Unsupported page size 0 MB
 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028
 kernel: #PF: supervisor read access in kernel mode
 kernel: #PF: error_code(0x0000) - not-present page
 kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0
 kernel: Oops: 0000 [#1] PREEMPT SMP PTI
 kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f
 kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017
 kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0
 kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 &lt;8b&gt; 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28
 kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246
 kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004
 kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000
 kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004
 kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000
 kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400
 kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000
 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0
 kernel: Call Trace:
 kernel:  &lt;TASK&gt;
 kernel:  ? __die_body+0x1a/0x60
 kernel:  ? page_fault_oops+0x16f/0x4a0
 kernel:  ? search_bpf_extables+0x65/0x70
 kernel:  ? fixup_exception+0x22/0x310
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  ? asm_exc_page_fault+0x22/0x30
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0
 kernel:  ? hugetlbfs_fill_super+0x28/0x1a0
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  vfs_get_super+0x40/0xa0
 kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10
 kernel:  vfs_get_tree+0x25/0xd0
 kernel:  vfs_cmd_create+0x64/0xe0
 kernel:  __x64_sys_fsconfig+0x395/0x410
 kernel:  do_syscall_64+0x80/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76
 kernel: RIP: 0033:0x7ffbc0cb87c9
 kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48
 kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af
 kernel: RAX: fffffffffff
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26688.html</URL>
        <Description>CVE-2024-26688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222482</URL>
        <Description>SUSE Bug 1222482</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ceph: prevent use-after-free in encode_cap_msg()

In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was
caught by KASAN at this line - 'ceph_buffer_get(arg-&gt;xattr_buf);'. This
implies before the refcount could be increment here, it was freed.

In same file, in "handle_cap_grant()" refcount is decremented by this
line - 'ceph_buffer_put(ci-&gt;i_xattrs.blob);'. It appears that a race
occurred and resource was freed by the latter line before the former
line could increment it.

encode_cap_msg() is called by __send_cap() and __send_cap() is called by
ceph_check_caps() after calling __prep_cap(). __prep_cap() is where
arg-&gt;xattr_buf is assigned to ci-&gt;i_xattrs.blob. This is the spot where
the refcount must be increased to prevent "use after free" error.</Note>
    </Notes>
    <CVE>CVE-2024-26689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26689.html</URL>
        <Description>CVE-2024-26689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222503</URL>
        <Description>SUSE Bug 1222503</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()

Syzbot reported a hang issue in migrate_pages_batch() called by mbind()
and nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.

While migrate_pages_batch() locks a folio and waits for the writeback to
complete, the log writer thread that should bring the writeback to
completion picks up the folio being written back in
nilfs_lookup_dirty_data_buffers() that it calls for subsequent log
creation and was trying to lock the folio.  Thus causing a deadlock.

In the first place, it is unexpected that folios/pages in the middle of
writeback will be updated and become dirty.  Nilfs2 adds a checksum to
verify the validity of the log being written and uses it for recovery at
mount, so data changes during writeback are suppressed.  Since this is
broken, an unclean shutdown could potentially cause recovery to fail.

Investigation revealed that the root cause is that the wait for writeback
completion in nilfs_page_mkwrite() is conditional, and if the backing
device does not require stable writes, data may be modified without
waiting.

Fix these issues by making nilfs_page_mkwrite() wait for writeback to
finish regardless of the stable write requirement of the backing device.</Note>
    </Notes>
    <CVE>CVE-2024-26696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26696.html</URL>
        <Description>CVE-2024-26696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222549</URL>
        <Description>SUSE Bug 1222549</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix data corruption in dsync block recovery for small block sizes

The helper function nilfs_recovery_copy_block() of
nilfs_recovery_dsync_blocks(), which recovers data from logs created by
data sync writes during a mount after an unclean shutdown, incorrectly
calculates the on-page offset when copying repair data to the file's page
cache.  In environments where the block size is smaller than the page
size, this flaw can cause data corruption and leak uninitialized memory
bytes during the recovery process.

Fix these issues by correcting this byte offset calculation on the page.</Note>
    </Notes>
    <CVE>CVE-2024-26697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26697.html</URL>
        <Description>CVE-2024-26697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222550</URL>
        <Description>SUSE Bug 1222550</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC

Recently, we encounter kernel crash in function rm3100_common_probe
caused by out of bound access of array rm3100_samp_rates (because of
underlying hardware failures). Add boundary check to prevent out of
bound access.</Note>
    </Notes>
    <CVE>CVE-2024-26702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26702.html</URL>
        <Description>CVE-2024-26702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222424</URL>
        <Description>SUSE Bug 1222424</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double-free of blocks due to wrong extents moved_len

In ext4_move_extents(), moved_len is only updated when all moves are
successfully executed, and only discards orig_inode and donor_inode
preallocations when moved_len is not zero. When the loop fails to exit
after successfully moving some extents, moved_len is not updated and
remains at 0, so it does not discard the preallocations.

If the moved extents overlap with the preallocated extents, the
overlapped extents are freed twice in ext4_mb_release_inode_pa() and
ext4_process_freed_data() (as described in commit 94d7c16cbbbd ("ext4:
Fix double-free of blocks with EXT4_IOC_MOVE_EXT")), and bb_free is
incremented twice. Hence when trim is executed, a zero-division bug is
triggered in mb_update_avg_fragment_size() because bb_free is not zero
and bb_fragments is zero.

Therefore, update move_len after each extent move to avoid the issue.</Note>
    </Notes>
    <CVE>CVE-2024-26704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26704.html</URL>
        <Description>CVE-2024-26704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222422</URL>
        <Description>SUSE Bug 1222422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm-crypt, dm-verity: disable tasklets

Tasklets have an inherent problem with memory corruption. The function
tasklet_action_common calls tasklet_trylock, then it calls the tasklet
callback and then it calls tasklet_unlock. If the tasklet callback frees
the structure that contains the tasklet or if it calls some code that may
free it, tasklet_unlock will write into free memory.

The commits 8e14f610159d and d9a02e016aaf try to fix it for dm-crypt, but
it is not a sufficient fix and the data corruption can still happen [1].
There is no fix for dm-verity and dm-verity will write into free memory
with every tasklet-processed bio.

There will be atomic workqueues implemented in the kernel 6.9 [2]. They
will have better interface and they will not suffer from the memory
corruption problem.

But we need something that stops the memory corruption now and that can be
backported to the stable kernels. So, I'm proposing this commit that
disables tasklets in both dm-crypt and dm-verity. This commit doesn't
remove the tasklet support, because the tasklet code will be reused when
atomic workqueues will be implemented.

[1] https://lore.kernel.org/all/d390d7ee-f142-44d3-822a-87949e14608b@suse.de/T/
[2] https://lore.kernel.org/lkml/20240130091300.2968534-1-tj@kernel.org/</Note>
    </Notes>
    <CVE>CVE-2024-26718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26718.html</URL>
        <Description>CVE-2024-26718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222416</URL>
        <Description>SUSE Bug 1222416</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()

There is a path in rt5645_jack_detect_work(), where rt5645-&gt;jd_mutex
is left locked forever. That may lead to deadlock
when rt5645_jack_detect_work() is called for the second time.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-26722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26722.html</URL>
        <Description>CVE-2024-26722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222520</URL>
        <Description>SUSE Bug 1222520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not ASSERT() if the newly created subvolume already got read

[BUG]
There is a syzbot crash, triggered by the ASSERT() during subvolume
creation:

 assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319
 ------------[ cut here ]------------
 kernel BUG at fs/btrfs/disk-io.c:1319!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60
  &lt;TASK&gt;
  btrfs_get_new_fs_root+0xd3/0xf0
  create_subvol+0xd02/0x1650
  btrfs_mksubvol+0xe95/0x12b0
  __btrfs_ioctl_snap_create+0x2f9/0x4f0
  btrfs_ioctl_snap_create+0x16b/0x200
  btrfs_ioctl+0x35f0/0x5cf0
  __x64_sys_ioctl+0x19d/0x210
  do_syscall_64+0x3f/0xe0
  entry_SYSCALL_64_after_hwframe+0x63/0x6b
 ---[ end trace 0000000000000000 ]---

[CAUSE]
During create_subvol(), after inserting root item for the newly created
subvolume, we would trigger btrfs_get_new_fs_root() to get the
btrfs_root of that subvolume.

The idea here is, we have preallocated an anonymous device number for
the subvolume, thus we can assign it to the new subvolume.

But there is really nothing preventing things like backref walk to read
the new subvolume.
If that happens before we call btrfs_get_new_fs_root(), the subvolume
would be read out, with a new anonymous device number assigned already.

In that case, we would trigger ASSERT(), as we really expect no one to
read out that subvolume (which is not yet accessible from the fs).
But things like backref walk is still possible to trigger the read on
the subvolume.

Thus our assumption on the ASSERT() is not correct in the first place.

[FIX]
Fix it by removing the ASSERT(), and just free the @anon_dev, reset it
to 0, and continue.

If the subvolume tree is read out by something else, it should have
already get a new anon_dev assigned thus we only need to free the
preallocated one.</Note>
    </Notes>
    <CVE>CVE-2024-26727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26727.html</URL>
        <Description>CVE-2024-26727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222536</URL>
        <Description>SUSE Bug 1222536</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arp: Prevent overflow in arp_req_get().

syzkaller reported an overflown write in arp_req_get(). [0]

When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour
entry and copies neigh-&gt;ha to struct arpreq.arp_ha.sa_data.

The arp_ha here is struct sockaddr, not struct sockaddr_storage, so
the sa_data buffer is just 14 bytes.

In the splat below, 2 bytes are overflown to the next int field,
arp_flags.  We initialise the field just after the memcpy(), so it's
not a problem.

However, when dev-&gt;addr_len is greater than 22 (e.g. MAX_ADDR_LEN),
arp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)
in arp_ioctl() before calling arp_req_get().

To avoid the overflow, let's limit the max length of memcpy().

Note that commit b5f0de6df6dc ("net: dev: Convert sa_data to flexible
array in struct sockaddr") just silenced syzkaller.

[0]:
memcpy: detected field-spanning write (size 16) of single field "r-&gt;arp_ha.sa_data" at net/ipv4/arp.c:1128 (size 14)
WARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Modules linked in:
CPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014
RIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Code: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb &lt;0f&gt; 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6
RSP: 0018:ffffc900050b7998 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001
RBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000
R13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010
FS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261
 inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981
 sock_do_ioctl+0xdf/0x260 net/socket.c:1204
 sock_ioctl+0x3ef/0x650 net/socket.c:1321
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x64/0xce
RIP: 0033:0x7f172b262b8d
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d
RDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003
RBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-26733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26733.html</URL>
        <Description>CVE-2024-26733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222585</URL>
        <Description>SUSE Bug 1222585</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

afs: Increase buffer size in afs_update_volume_status()

The max length of volume-&gt;vid value is 20 characters.
So increase idbuf[] size up to 24 to avoid overflow.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[DH: Actually, it's 20 + NUL, so increase it to 24 and use snprintf()]</Note>
    </Notes>
    <CVE>CVE-2024-26736</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26736.html</URL>
        <Description>CVE-2024-26736</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222586</URL>
        <Description>SUSE Bug 1222586</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel

The following race is possible between bpf_timer_cancel_and_free
and bpf_timer_cancel. It will lead a UAF on the timer-&gt;timer.

bpf_timer_cancel();
	spin_lock();
	t = timer-&gt;time;
	spin_unlock();

					bpf_timer_cancel_and_free();
						spin_lock();
						t = timer-&gt;timer;
						timer-&gt;timer = NULL;
						spin_unlock();
						hrtimer_cancel(&amp;t-&gt;timer);
						kfree(t);

	/* UAF on t */
	hrtimer_cancel(&amp;t-&gt;timer);

In bpf_timer_cancel_and_free, this patch frees the timer-&gt;timer
after a rcu grace period. This requires a rcu_head addition
to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init,
this does not need a kfree_rcu because it is still under the
spin_lock and timer-&gt;timer has not been visible by others yet.

In bpf_timer_cancel, rcu_read_lock() is added because this helper
can be used in a non rcu critical section context (e.g. from
a sleepable bpf prog). Other timer-&gt;timer usages in helpers.c
have been audited, bpf_timer_cancel() is the only place where
timer-&gt;timer is used outside of the spin_lock.

Another solution considered is to mark a t-&gt;flag in bpf_timer_cancel
and clear it after hrtimer_cancel() is done.  In bpf_timer_cancel_and_free,
it busy waits for the flag to be cleared before kfree(t). This patch
goes with a straight forward solution and frees timer-&gt;timer after
a rcu grace period.</Note>
    </Notes>
    <CVE>CVE-2024-26737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26737.html</URL>
        <Description>CVE-2024-26737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222557</URL>
        <Description>SUSE Bug 1222557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mirred: don't override retval if we already lost the skb

If we're redirecting the skb, and haven't called tcf_mirred_forward(),
yet, we need to tell the core to drop the skb by setting the retcode
to SHOT. If we have called tcf_mirred_forward(), however, the skb
is out of our hands and returning SHOT will lead to UaF.

Move the retval override to the error path which actually need it.</Note>
    </Notes>
    <CVE>CVE-2024-26739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26739.html</URL>
        <Description>CVE-2024-26739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222559</URL>
        <Description>SUSE Bug 1222559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/qedr: Fix qedr_create_user_qp error flow

Avoid the following warning by making sure to free the allocated
resources in case that qedr_init_user_queue() fail.

-----------[ cut here ]-----------
WARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874 uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
Modules linked in: tls target_core_user uio target_core_pscsi target_core_file target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1 intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel qed libata tg3
ghash_clmulni_intel megaraid_sas crc8 wmi [last unloaded: ib_srpt]
CPU: 0 PID: 143192 Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64 #1
Hardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0 01/25/2022
RIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
Code: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49 8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 &lt;0f&gt; 0b eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff
RSP: 0018:ffffb7c6cadfbc60 EFLAGS: 00010286
RAX: ffff8f0889ee3f60 RBX: ffff8f088c1a5200 RCX: 00000000802a0016
RDX: 00000000802a0017 RSI: 0000000000000001 RDI: ffff8f0880042600
RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
R10: ffff8f11fffd5000 R11: 0000000000039000 R12: ffff8f0d5b36cd80
R13: ffff8f088c1a5250 R14: ffff8f1206d91000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8f11d7c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000147069200e20 CR3: 00000001c7210002 CR4: 00000000001706f0
Call Trace:
&lt;TASK&gt;
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? ib_uverbs_close+0x1f/0xb0 [ib_uverbs]
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
? __warn+0x81/0x110
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
? report_bug+0x10a/0x140
? handle_bug+0x3c/0x70
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
ib_uverbs_close+0x1f/0xb0 [ib_uverbs]
__fput+0x94/0x250
task_work_run+0x5c/0x90
do_exit+0x270/0x4a0
do_group_exit+0x2d/0x90
get_signal+0x87c/0x8c0
arch_do_signal_or_restart+0x25/0x100
? ib_uverbs_ioctl+0xc2/0x110 [ib_uverbs]
exit_to_user_mode_loop+0x9c/0x130
exit_to_user_mode_prepare+0xb6/0x100
syscall_exit_to_user_mode+0x12/0x40
do_syscall_64+0x69/0x90
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x22/0x40
? do_syscall_64+0x69/0x90
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x22/0x40
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
? common_interrupt+0x43/0xa0
entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x1470abe3ec6b
Code: Unable to access opcode bytes at RIP 0x1470abe3ec41.
RSP: 002b:00007fff13ce9108 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: fffffffffffffffc RBX: 00007fff13ce9218 RCX: 00001470abe3ec6b
RDX: 00007fff13ce9200 RSI: 00000000c0181b01 RDI: 0000000000000004
RBP: 00007fff13ce91e0 R08: 0000558d9655da10 R09: 0000558d9655dd00
R10: 00007fff13ce95c0 R11: 0000000000000246 R12: 00007fff13ce9358
R13: 0000000000000013 R14: 0000558d9655db50 R15: 00007fff13ce9470
&lt;/TASK&gt;
--[ end trace 888a9b92e04c5c97 ]--</Note>
    </Notes>
    <CVE>CVE-2024-26743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26743.html</URL>
        <Description>CVE-2024-26743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222677</URL>
        <Description>SUSE Bug 1222677</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Support specifying the srpt_service_guid parameter

Make loading ib_srpt with this parameter set work. The current behavior is
that setting that parameter while loading the ib_srpt kernel module
triggers the following kernel crash:

BUG: kernel NULL pointer dereference, address: 0000000000000000
Call Trace:
 &lt;TASK&gt;
 parse_one+0x18c/0x1d0
 parse_args+0xe1/0x230
 load_module+0x8de/0xa60
 init_module_from_file+0x8b/0xd0
 idempotent_init_module+0x181/0x240
 __x64_sys_finit_module+0x5a/0xb0
 do_syscall_64+0x5f/0xe0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76</Note>
    </Notes>
    <CVE>CVE-2024-26744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26744.html</URL>
        <Description>CVE-2024-26744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222449</URL>
        <Description>SUSE Bug 1222449</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV

When kdump kernel tries to copy dump data over SR-IOV, LPAR panics due
to NULL pointer exception:

  Kernel attempted to read user page (0) - exploit attempt? (uid: 0)
  BUG: Kernel NULL pointer dereference on read at 0x00000000
  Faulting instruction address: 0xc000000020847ad4
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop
  CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12
  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries
  NIP:  c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c
  REGS: c000000029162ca0 TRAP: 0300   Not tainted  (6.4.0-Test102+)
  MSR:  800000000280b033 &lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE&gt;  CR: 48288244  XER: 00000008
  CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1
  ...
  NIP _find_next_zero_bit+0x24/0x110
  LR  bitmap_find_next_zero_area_off+0x5c/0xe0
  Call Trace:
    dev_printk_emit+0x38/0x48 (unreliable)
    iommu_area_alloc+0xc4/0x180
    iommu_range_alloc+0x1e8/0x580
    iommu_alloc+0x60/0x130
    iommu_alloc_coherent+0x158/0x2b0
    dma_iommu_alloc_coherent+0x3c/0x50
    dma_alloc_attrs+0x170/0x1f0
    mlx5_cmd_init+0xc0/0x760 [mlx5_core]
    mlx5_function_setup+0xf0/0x510 [mlx5_core]
    mlx5_init_one+0x84/0x210 [mlx5_core]
    probe_one+0x118/0x2c0 [mlx5_core]
    local_pci_probe+0x68/0x110
    pci_call_probe+0x68/0x200
    pci_device_probe+0xbc/0x1a0
    really_probe+0x104/0x540
    __driver_probe_device+0xb4/0x230
    driver_probe_device+0x54/0x130
    __driver_attach+0x158/0x2b0
    bus_for_each_dev+0xa8/0x130
    driver_attach+0x34/0x50
    bus_add_driver+0x16c/0x300
    driver_register+0xa4/0x1b0
    __pci_register_driver+0x68/0x80
    mlx5_init+0xb8/0x100 [mlx5_core]
    do_one_initcall+0x60/0x300
    do_init_module+0x7c/0x2b0

At the time of LPAR dump, before kexec hands over control to kdump
kernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT.
For the SR-IOV case, default DMA window "ibm,dma-window" is removed from
the FDT and DDW added, for the device.

Now, kexec hands over control to the kdump kernel.

When the kdump kernel initializes, PCI busses are scanned and IOMMU
group/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV
case, there is no "ibm,dma-window". The original commit: b1fc44eaa9ba,
fixes the path where memory is pre-mapped (direct mapped) to the DDW.
When TCEs are direct mapped, there is no need to initialize IOMMU
tables.

iommu_table_setparms_lpar() only considers "ibm,dma-window" property
when initiallizing IOMMU table. In the scenario where TCEs are
dynamically allocated for SR-IOV, newly created IOMMU table is not
initialized. Later, when the device driver tries to enter TCEs for the
SR-IOV device, NULL pointer execption is thrown from iommu_area_alloc().

The fix is to initialize the IOMMU table with DDW property stored in the
FDT. There are 2 points to remember:

	1. For the dedicated adapter, kdump kernel would encounter both
	   default and DDW in FDT. In this case, DDW property is used to
	   initialize the IOMMU table.

	2. A DDW could be direct or dynamic mapped. kdump kernel would
	   initialize IOMMU table and mark the existing DDW as
	   "dynamic". This works fine since, at the time of table
	   initialization, iommu_table_clear() makes some space in the
	   DDW, for some predefined number of TCEs which are needed for
	   kdump to succeed.</Note>
    </Notes>
    <CVE>CVE-2024-26745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26745.html</URL>
        <Description>CVE-2024-26745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222678</URL>
        <Description>SUSE Bug 1222678</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: roles: fix NULL pointer issue when put module's reference

In current design, usb role class driver will get usb_role_switch parent's
module reference after the user get usb_role_switch device and put the
reference after the user put the usb_role_switch device. However, the
parent device of usb_role_switch may be removed before the user put the
usb_role_switch. If so, then, NULL pointer issue will be met when the user
put the parent module's reference.

This will save the module pointer in structure of usb_role_switch. Then,
we don't need to find module by iterating long relations.</Note>
    </Notes>
    <CVE>CVE-2024-26747</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26747.html</URL>
        <Description>CVE-2024-26747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222609</URL>
        <Description>SUSE Bug 1222609</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()

  ...
  cdns3_gadget_ep_free_request(&amp;priv_ep-&gt;endpoint, &amp;priv_req-&gt;request);
  list_del_init(&amp;priv_req-&gt;list);
  ...

'priv_req' actually free at cdns3_gadget_ep_free_request(). But
list_del_init() use priv_req-&gt;list after it.

[ 1542.642868][  T534] BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xd4
[ 1542.642868][  T534]
[ 1542.653162][  T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3):
[ 1542.660311][  T534]  __list_del_entry_valid+0x10/0xd4
[ 1542.665375][  T534]  cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3]
[ 1542.671571][  T534]  usb_ep_disable+0x44/0xe4
[ 1542.675948][  T534]  ffs_func_eps_disable+0x64/0xc8
[ 1542.680839][  T534]  ffs_func_set_alt+0x74/0x368
[ 1542.685478][  T534]  ffs_func_disable+0x18/0x28

Move list_del_init() before cdns3_gadget_ep_free_request() to resolve this
problem.</Note>
    </Notes>
    <CVE>CVE-2024-26749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26749.html</URL>
        <Description>CVE-2024-26749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222680</URL>
        <Description>SUSE Bug 1222680</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ARM: ep93xx: Add terminator to gpiod_lookup_table

Without the terminator, if a con_id is passed to gpio_find() that
does not exist in the lookup table the function will not stop looping
correctly, and eventually cause an oops.</Note>
    </Notes>
    <CVE>CVE-2024-26751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26751.html</URL>
        <Description>CVE-2024-26751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222724</URL>
        <Description>SUSE Bug 1222724</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()

The gtp_net_ops pernet operations structure for the subsystem must be
registered before registering the generic netlink family.

Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:

general protection fault, probably for non-canonical address
0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
CPU: 1 PID: 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
RIP: 0010:gtp_genl_dump_pdp+0x1be/0x800 [gtp]
Code: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86
      df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 &lt;80&gt;
      3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74
RSP: 0018:ffff888014107220 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000
FS:  00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x90/0xa0
 ? die_addr+0x50/0xd0
 ? exc_general_protection+0x148/0x220
 ? asm_exc_general_protection+0x22/0x30
 ? gtp_genl_dump_pdp+0x1be/0x800 [gtp]
 ? __alloc_skb+0x1dd/0x350
 ? __pfx___alloc_skb+0x10/0x10
 genl_dumpit+0x11d/0x230
 netlink_dump+0x5b9/0xce0
 ? lockdep_hardirqs_on_prepare+0x253/0x430
 ? __pfx_netlink_dump+0x10/0x10
 ? kasan_save_track+0x10/0x40
 ? __kasan_kmalloc+0x9b/0xa0
 ? genl_start+0x675/0x970
 __netlink_dump_start+0x6fc/0x9f0
 genl_family_rcv_msg_dumpit+0x1bb/0x2d0
 ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10
 ? genl_op_from_small+0x2a/0x440
 ? cap_capable+0x1d0/0x240
 ? __pfx_genl_start+0x10/0x10
 ? __pfx_genl_dumpit+0x10/0x10
 ? __pfx_genl_done+0x10/0x10
 ? security_capable+0x9d/0xe0</Note>
    </Notes>
    <CVE>CVE-2024-26754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26754.html</URL>
        <Description>CVE-2024-26754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222632</URL>
        <Description>SUSE Bug 1222632</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: target: pscsi: Fix bio_put() for error case

As of commit 066ff571011d ("block: turn bio_kmalloc into a simple kmalloc
wrapper"), a bio allocated by bio_kmalloc() must be freed by bio_uninit()
and kfree(). That is not done properly for the error case, hitting WARN and
NULL pointer dereference in bio_free().</Note>
    </Notes>
    <CVE>CVE-2024-26760</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26760.html</URL>
        <Description>CVE-2024-26760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222596</URL>
        <Description>SUSE Bug 1222596</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2024-267600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-267600.html</URL>
        <Description>CVE-2024-267600</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm-crypt: don't modify the data when using authenticated encryption

It was said that authenticated encryption could produce invalid tag when
the data that is being encrypted is modified [1]. So, fix this problem by
copying the data into the clone bio first and then encrypt them inside the
clone bio.

This may reduce performance, but it is needed to prevent the user from
corrupting the device by writing data with O_DIRECT and modifying them at
the same time.

[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/</Note>
    </Notes>
    <CVE>CVE-2024-26763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26763.html</URL>
        <Description>CVE-2024-26763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222720</URL>
        <Description>SUSE Bug 1222720</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio

If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the
following kernel warning appears:

WARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8
Call trace:
 kiocb_set_cancel_fn+0x9c/0xa8
 ffs_epfile_read_iter+0x144/0x1d0
 io_read+0x19c/0x498
 io_issue_sqe+0x118/0x27c
 io_submit_sqes+0x25c/0x5fc
 __arm64_sys_io_uring_enter+0x104/0xab0
 invoke_syscall+0x58/0x11c
 el0_svc_common+0xb4/0xf4
 do_el0_svc+0x2c/0xb0
 el0_svc+0x2c/0xa4
 el0t_64_sync_handler+0x68/0xb4
 el0t_64_sync+0x1a4/0x1a8

Fix this by setting the IOCB_AIO_RW flag for read and write I/O that is
submitted by libaio.</Note>
    </Notes>
    <CVE>CVE-2024-26764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26764.html</URL>
        <Description>CVE-2024-26764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222721</URL>
        <Description>SUSE Bug 1222721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one error

Unfortunately the commit `fd8958efe877` introduced another error
causing the `descs` array to overflow. This reults in further crashes
easily reproducible by `sendmsg` system call.

[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI
[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]
--
[ 1080.974535] Call Trace:
[ 1080.976990]  &lt;TASK&gt;
[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]
[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]
[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]
[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]
[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210
--
[ 1081.148347]  __sys_sendmsg+0x59/0xa0

crash&gt; ipoib_txreq 0xffff9cfeba229f00
struct ipoib_txreq {
  txreq = {
    list = {
      next = 0xffff9cfeba229f00,
      prev = 0xffff9cfeba229f00
    },
    descp = 0xffff9cfeba229f40,
    coalesce_buf = 0x0,
    wait = 0xffff9cfea4e69a48,
    complete = 0xffffffffc0fe0760 &lt;hfi1_ipoib_sdma_complete&gt;,
    packet_len = 0x46d,
    tlen = 0x0,
    num_desc = 0x0,
    desc_limit = 0x6,
    next_descq_idx = 0x45c,
    coalesce_idx = 0x0,
    flags = 0x0,
    descs = {{
        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)
      }, {
        qw = {  0x3800014231b108, 0x4}
      }, {
        qw = { 0x310000e4ee0fcf0, 0x8}
      }, {
        qw = {  0x3000012e9f8000, 0x8}
      }, {
        qw = {  0x59000dfb9d0000, 0x8}
      }, {
        qw = {  0x78000e02e40000, 0x8}
      }}
  },
  sdma_hdr =  0x400300015528b000,  &lt;&lt;&lt; invalid pointer in the tx request structure
  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)
  complete = 0x0,
  priv = 0x0,
  txq = 0xffff9cfea4e69880,
  skb = 0xffff9d099809f400
}

If an SDMA send consists of exactly 6 descriptors and requires dword
padding (in the 7th descriptor), the sdma_txreq descriptor array is not
properly expanded and the packet will overflow into the container
structure. This results in a panic when the send completion runs. The
exact panic varies depending on what elements of the container structure
get corrupted. The fix is to use the correct expression in
_pad_sdma_tx_descs() to test the need to expand the descriptor array.

With this patch the crashes are no longer reproducible and the machine is
stable.</Note>
    </Notes>
    <CVE>CVE-2024-26766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26766.html</URL>
        <Description>CVE-2024-26766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222726</URL>
        <Description>SUSE Bug 1222726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222882</URL>
        <Description>SUSE Bug 1222882</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvmet-fc: avoid deadlock on delete association path

When deleting an association the shutdown path is deadlocking because we
try to flush the nvmet_wq nested. Avoid this by deadlock by deferring
the put work into its own work item.</Note>
    </Notes>
    <CVE>CVE-2024-26769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26769.html</URL>
        <Description>CVE-2024-26769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222727</URL>
        <Description>SUSE Bug 1222727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: edma: Add some null pointer checks to the edma_probe

devm_kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.</Note>
    </Notes>
    <CVE>CVE-2024-26771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26771.html</URL>
        <Description>CVE-2024-26771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222610</URL>
        <Description>SUSE Bug 1222610</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()

Places the logic for checking if the group's block bitmap is corrupt under
the protection of the group lock to avoid allocating blocks from the group
with a corrupted block bitmap.</Note>
    </Notes>
    <CVE>CVE-2024-26772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26772.html</URL>
        <Description>CVE-2024-26772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222613</URL>
        <Description>SUSE Bug 1222613</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()

Determine if the group block bitmap is corrupted before using ac_b_ex in
ext4_mb_try_best_found() to avoid allocating blocks from a group with a
corrupted block bitmap in the following concurrency and making the
situation worse.

ext4_mb_regular_allocator
  ext4_lock_group(sb, group)
  ext4_mb_good_group
   // check if the group bbitmap is corrupted
  ext4_mb_complex_scan_group
   // Scan group gets ac_b_ex but doesn't use it
  ext4_unlock_group(sb, group)
                           ext4_mark_group_bitmap_corrupted(group)
                           // The block bitmap was corrupted during
                           // the group unlock gap.
  ext4_mb_try_best_found
    ext4_lock_group(ac-&gt;ac_sb, group)
    ext4_mb_use_best_found
      mb_mark_used
      // Allocating blocks in block bitmap corrupted group</Note>
    </Notes>
    <CVE>CVE-2024-26773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26773.html</URL>
        <Description>CVE-2024-26773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222618</URL>
        <Description>SUSE Bug 1222618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected

Return IRQ_NONE from the interrupt handler when no interrupt was
detected. Because an empty interrupt will cause a null pointer error:

    Unable to handle kernel NULL pointer dereference at virtual
  address 0000000000000008
    Call trace:
        complete+0x54/0x100
        hisi_sfc_v3xx_isr+0x2c/0x40 [spi_hisi_sfc_v3xx]
        __handle_irq_event_percpu+0x64/0x1e0
        handle_irq_event+0x7c/0x1cc</Note>
    </Notes>
    <CVE>CVE-2024-26776</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26776.html</URL>
        <Description>CVE-2024-26776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222764</URL>
        <Description>SUSE Bug 1222764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix race condition on enabling fast-xmit

fast-xmit must only be enabled after the sta has been uploaded to the driver,
otherwise it could end up passing the not-yet-uploaded sta via drv_tx calls
to the driver, leading to potential crashes because of uninitialized drv_priv
data.
Add a missing sta-&gt;uploaded check and re-check fast xmit after inserting a sta.</Note>
    </Notes>
    <CVE>CVE-2024-26779</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26779.html</URL>
        <Description>CVE-2024-26779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222772</URL>
        <Description>SUSE Bug 1222772</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index

With numa balancing on, when a numa system is running where a numa node
doesn't have its local memory so it has no managed zones, the following
oops has been observed.  It's because wakeup_kswapd() is called with a
wrong zone index, -1.  Fixed it by checking the index before calling
wakeup_kswapd().

&gt; BUG: unable to handle page fault for address: 00000000000033f3
&gt; #PF: supervisor read access in kernel mode
&gt; #PF: error_code(0x0000) - not-present page
&gt; PGD 0 P4D 0
&gt; Oops: 0000 [#1] PREEMPT SMP NOPTI
&gt; CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255
&gt; Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
&gt;    rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
&gt; RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)
&gt; Code: (omitted)
&gt; RSP: 0000:ffffc90004257d58 EFLAGS: 00010286
&gt; RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003
&gt; RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480
&gt; RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff
&gt; R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003
&gt; R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940
&gt; FS:  00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000
&gt; CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&gt; CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0
&gt; DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
&gt; DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
&gt; PKRU: 55555554
&gt; Call Trace:
&gt;  &lt;TASK&gt;
&gt; ? __die
&gt; ? page_fault_oops
&gt; ? __pte_offset_map_lock
&gt; ? exc_page_fault
&gt; ? asm_exc_page_fault
&gt; ? wakeup_kswapd
&gt; migrate_misplaced_page
&gt; __handle_mm_fault
&gt; handle_mm_fault
&gt; do_user_addr_fault
&gt; exc_page_fault
&gt; asm_exc_page_fault
&gt; RIP: 0033:0x55b897ba0808
&gt; Code: (omitted)
&gt; RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287
&gt; RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0
&gt; RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0
&gt; RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075
&gt; R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
&gt; R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000
&gt;  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-26783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26783.html</URL>
        <Description>CVE-2024-26783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222615</URL>
        <Description>SUSE Bug 1222615</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mmc: mmci: stm32: fix DMA API overlapping mappings warning

Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning:

DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,
overlapping mappings aren't supported
WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568
add_dma_entry+0x234/0x2f4
Modules linked in:
CPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1
Hardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)
Workqueue: events_freezable mmc_rescan
Call trace:
add_dma_entry+0x234/0x2f4
debug_dma_map_sg+0x198/0x350
__dma_map_sg_attrs+0xa0/0x110
dma_map_sg_attrs+0x10/0x2c
sdmmc_idma_prep_data+0x80/0xc0
mmci_prep_data+0x38/0x84
mmci_start_data+0x108/0x2dc
mmci_request+0xe4/0x190
__mmc_start_request+0x68/0x140
mmc_start_request+0x94/0xc0
mmc_wait_for_req+0x70/0x100
mmc_send_tuning+0x108/0x1ac
sdmmc_execute_tuning+0x14c/0x210
mmc_execute_tuning+0x48/0xec
mmc_sd_init_uhs_card.part.0+0x208/0x464
mmc_sd_init_card+0x318/0x89c
mmc_attach_sd+0xe4/0x180
mmc_rescan+0x244/0x320

DMA API debug brings to light leaking dma-mappings as dma_map_sg and
dma_unmap_sg are not correctly balanced.

If an error occurs in mmci_cmd_irq function, only mmci_dma_error
function is called and as this API is not managed on stm32 variant,
dma_unmap_sg is never called in this error path.</Note>
    </Notes>
    <CVE>CVE-2024-26787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26787.html</URL>
        <Description>CVE-2024-26787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222781</URL>
        <Description>SUSE Bug 1222781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read

There is chip (ls1028a) errata:

The SoC may hang on 16 byte unaligned read transactions by QDMA.

Unaligned read transactions initiated by QDMA may stall in the NOC
(Network On-Chip), causing a deadlock condition. Stalled transactions will
trigger completion timeouts in PCIe controller.

Workaround:
Enable prefetch by setting the source descriptor prefetchable bit
( SD[PF] = 1 ).

Implement this workaround.</Note>
    </Notes>
    <CVE>CVE-2024-26790</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26790.html</URL>
        <Description>CVE-2024-26790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222784</URL>
        <Description>SUSE Bug 1222784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix double free of anonymous device after snapshot creation failure

When creating a snapshot we may do a double free of an anonymous device
in case there's an error committing the transaction. The second free may
result in freeing an anonymous device number that was allocated by some
other subsystem in the kernel or another btrfs filesystem.

The steps that lead to this:

1) At ioctl.c:create_snapshot() we allocate an anonymous device number
   and assign it to pending_snapshot-&gt;anon_dev;

2) Then we call btrfs_commit_transaction() and end up at
   transaction.c:create_pending_snapshot();

3) There we call btrfs_get_new_fs_root() and pass it the anonymous device
   number stored in pending_snapshot-&gt;anon_dev;

4) btrfs_get_new_fs_root() frees that anonymous device number because
   btrfs_lookup_fs_root() returned a root - someone else did a lookup
   of the new root already, which could some task doing backref walking;

5) After that some error happens in the transaction commit path, and at
   ioctl.c:create_snapshot() we jump to the 'fail' label, and after
   that we free again the same anonymous device number, which in the
   meanwhile may have been reallocated somewhere else, because
   pending_snapshot-&gt;anon_dev still has the same value as in step 1.

Recently syzbot ran into this and reported the following trace:

  ------------[ cut here ]------------
  ida_free called for id=51 which is not allocated.
  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525
  Modules linked in:
  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525
  Code: 10 42 80 3c 28 (...)
  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246
  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000
  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000
  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4
  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246
  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246
  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346
   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837
   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931
   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404
   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848
   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998
   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044
   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306
   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393
   btrfs_ioctl+0xa74/0xd40
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:871 [inline]
   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857
   do_syscall_64+0xfb/0x240
   entry_SYSCALL_64_after_hwframe+0x6f/0x77
  RIP: 0033:0x7fca3e67dda9
  Code: 28 00 00 00 (...)
  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9
  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658
   &lt;/TASK&gt;

Where we get an explicit message where we attempt to free an anonymous
device number that is not currently allocated. It happens in a different
code path from the example below, at btrfs_get_root_ref(), so this change
may not fix the case triggered by sy
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26792</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26792.html</URL>
        <Description>CVE-2024-26792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222430</URL>
        <Description>SUSE Bug 1222430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gtp: fix use-after-free and null-ptr-deref in gtp_newlink()

The gtp_link_ops operations structure for the subsystem must be
registered after registering the gtp_net_ops pernet operations structure.

Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:

[ 1010.702740] gtp: GTP module unloaded
[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI
[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1
[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00
[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203
[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000
[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282
[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000
[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80
[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400
[ 1010.715953] FS:  00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000
[ 1010.715958] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0
[ 1010.715968] PKRU: 55555554
[ 1010.715972] Call Trace:
[ 1010.715985]  ? __die_body.cold+0x1a/0x1f
[ 1010.715995]  ? die_addr+0x43/0x70
[ 1010.716002]  ? exc_general_protection+0x199/0x2f0
[ 1010.716016]  ? asm_exc_general_protection+0x1e/0x30
[ 1010.716026]  ? gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.716034]  ? gtp_net_exit+0x150/0x150 [gtp]
[ 1010.716042]  __rtnl_newlink+0x1063/0x1700
[ 1010.716051]  ? rtnl_setlink+0x3c0/0x3c0
[ 1010.716063]  ? is_bpf_text_address+0xc0/0x1f0
[ 1010.716070]  ? kernel_text_address.part.0+0xbb/0xd0
[ 1010.716076]  ? __kernel_text_address+0x56/0xa0
[ 1010.716084]  ? unwind_get_return_address+0x5a/0xa0
[ 1010.716091]  ? create_prof_cpu_mask+0x30/0x30
[ 1010.716098]  ? arch_stack_walk+0x9e/0xf0
[ 1010.716106]  ? stack_trace_save+0x91/0xd0
[ 1010.716113]  ? stack_trace_consume_entry+0x170/0x170
[ 1010.716121]  ? __lock_acquire+0x15c5/0x5380
[ 1010.716139]  ? mark_held_locks+0x9e/0xe0
[ 1010.716148]  ? kmem_cache_alloc_trace+0x35f/0x3c0
[ 1010.716155]  ? __rtnl_newlink+0x1700/0x1700
[ 1010.716160]  rtnl_newlink+0x69/0xa0
[ 1010.716166]  rtnetlink_rcv_msg+0x43b/0xc50
[ 1010.716172]  ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716179]  ? lock_acquire+0x1fe/0x560
[ 1010.716188]  ? netlink_deliver_tap+0x12f/0xd50
[ 1010.716196]  netlink_rcv_skb+0x14d/0x440
[ 1010.716202]  ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716208]  ? netlink_ack+0xab0/0xab0
[ 1010.716213]  ? netlink_deliver_tap+0x202/0xd50
[ 1010.716220]  ? netlink_deliver_tap+0x218/0xd50
[ 1010.716226]  ? __virt_addr_valid+0x30b/0x590
[ 1010.716233]  netlink_unicast+0x54b/0x800
[ 1010.716240]  ? netlink_attachskb+0x870/0x870
[ 1010.716248]  ? __check_object_size+0x2de/0x3b0
[ 1010.716254]  netlink_sendmsg+0x938/0xe40
[ 1010.716261]  ? netlink_unicast+0x800/0x800
[ 1010.716269]  ? __import_iovec+0x292/0x510
[ 1010.716276]  ? netlink_unicast+0x800/0x800
[ 1010.716284]  __sock_sendmsg+0x159/0x190
[ 1010.716290]  ____sys_sendmsg+0x712/0x880
[ 1010.716297]  ? sock_write_iter+0x3d0/0x3d0
[ 1010.716304]  ? __ia32_sys_recvmmsg+0x270/0x270
[ 1010.716309]  ? lock_acquire+0x1fe/0x560
[ 1010.716315]  ? drain_array_locked+0x90/0x90
[ 1010.716324]  ___sys_sendmsg+0xf8/0x170
[ 1010.716331]  ? sendmsg_copy_msghdr+0x170/0x170
[ 1010.716337]  ? lockdep_init_map
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26793.html</URL>
        <Description>CVE-2024-26793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222428</URL>
        <Description>SUSE Bug 1222428</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbcon: always restore the old font data in fbcon_do_set_font()

Commit a5a923038d70 (fbdev: fbcon: Properly revert changes when
vc_resize() failed) started restoring old font data upon failure (of
vc_resize()). But it performs so only for user fonts. It means that the
"system"/internal fonts are not restored at all. So in result, the very
first call to fbcon_do_set_font() performs no restore at all upon
failing vc_resize().

This can be reproduced by Syzkaller to crash the system on the next
invocation of font_get(). It's rather hard to hit the allocation failure
in vc_resize() on the first font_set(), but not impossible. Esp. if
fault injection is used to aid the execution/failure. It was
demonstrated by Sirius:
  BUG: unable to handle page fault for address: fffffffffffffff8
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD cb7b067 P4D cb7b067 PUD cb7d067 PMD 0
  Oops: 0000 [#1] PREEMPT SMP KASAN
  CPU: 1 PID: 8007 Comm: poc Not tainted 6.7.0-g9d1694dc91ce #20
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:fbcon_get_font+0x229/0x800 drivers/video/fbdev/core/fbcon.c:2286
  Call Trace:
   &lt;TASK&gt;
   con_font_get drivers/tty/vt/vt.c:4558 [inline]
   con_font_op+0x1fc/0xf20 drivers/tty/vt/vt.c:4673
   vt_k_ioctl drivers/tty/vt/vt_ioctl.c:474 [inline]
   vt_ioctl+0x632/0x2ec0 drivers/tty/vt/vt_ioctl.c:752
   tty_ioctl+0x6f8/0x1570 drivers/tty/tty_io.c:2803
   vfs_ioctl fs/ioctl.c:51 [inline]
  ...

So restore the font data in any case, not only for user fonts. Note the
later 'if' is now protected by 'old_userfont' and not 'old_data' as the
latter is always set now. (And it is supposed to be non-NULL. Otherwise
we would see the bug above again.)</Note>
    </Notes>
    <CVE>CVE-2024-26798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26798.html</URL>
        <Description>CVE-2024-26798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222798</URL>
        <Description>SUSE Bug 1222798</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter

syzbot reported the following uninit-value access issue [1]:

netlink_to_full_skb() creates a new `skb` and puts the `skb-&gt;data`
passed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data
size is specified as `len` and passed to skb_put_data(). This `len`
is based on `skb-&gt;end` that is not data offset but buffer offset. The
`skb-&gt;end` contains data and tailroom. Since the tailroom is not
initialized when the new `skb` created, KMSAN detects uninitialized
memory area when copying the data.

This patch resolved this issue by correct the len from `skb-&gt;end` to
`skb-&gt;len`, which is the actual data offset.

BUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]
BUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 copy_to_user_iter lib/iov_iter.c:24 [inline]
 iterate_ubuf include/linux/iov_iter.h:29 [inline]
 iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 iterate_and_advance include/linux/iov_iter.h:271 [inline]
 _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
 copy_to_iter include/linux/uio.h:197 [inline]
 simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532
 __skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420
 skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
 skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]
 packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482
 sock_recvmsg_nosec net/socket.c:1044 [inline]
 sock_recvmsg net/socket.c:1066 [inline]
 sock_read_iter+0x467/0x580 net/socket.c:1136
 call_read_iter include/linux/fs.h:2014 [inline]
 new_sync_read fs/read_write.c:389 [inline]
 vfs_read+0x8f6/0xe00 fs/read_write.c:470
 ksys_read+0x20f/0x4c0 fs/read_write.c:613
 __do_sys_read fs/read_write.c:623 [inline]
 __se_sys_read fs/read_write.c:621 [inline]
 __x64_sys_read+0x93/0xd0 fs/read_write.c:621
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was stored to memory at:
 skb_put_data include/linux/skbuff.h:2622 [inline]
 netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]
 __netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]
 __netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325
 netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]
 netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]
 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
 netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
 __sys_sendmsg net/socket.c:2667 [inline]
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 free_pages_prepare mm/page_alloc.c:1087 [inline]
 free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347
 free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533
 release_pages+0x23d3/0x2410 mm/swap.c:1042
 free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316
 tlb_batch_pages
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26805.html</URL>
        <Description>CVE-2024-26805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222630</URL>
        <Description>SUSE Bug 1222630</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Both cadence-quadspi -&gt;runtime_suspend() and -&gt;runtime_resume()
implementations start with:

	struct cqspi_st *cqspi = dev_get_drvdata(dev);
	struct spi_controller *host = dev_get_drvdata(dev);

This obviously cannot be correct, unless "struct cqspi_st" is the
first member of " struct spi_controller", or the other way around, but
it is not the case. "struct spi_controller" is allocated by
devm_spi_alloc_host(), which allocates an extra amount of memory for
private data, used to store "struct cqspi_st".

The -&gt;probe() function of the cadence-quadspi driver then sets the
device drvdata to store the address of the "struct cqspi_st"
structure. Therefore:

	struct cqspi_st *cqspi = dev_get_drvdata(dev);

is correct, but:

	struct spi_controller *host = dev_get_drvdata(dev);

is not, as it makes "host" point not to a "struct spi_controller" but
to the same "struct cqspi_st" structure as above.

This obviously leads to bad things (memory corruption, kernel crashes)
directly during -&gt;probe(), as -&gt;probe() enables the device using PM
runtime, leading the -&gt;runtime_resume() hook being called, which in
turns calls spi_controller_resume() with the wrong pointer.

This has at least been reported [0] to cause a kernel crash, but the
exact behavior will depend on the memory contents.

[0] https://lore.kernel.org/all/20240226121803.5a7r5wkpbbowcxgx@dhruva/

This issue potentially affects all platforms that are currently using
the cadence-quadspi driver.</Note>
    </Notes>
    <CVE>CVE-2024-26807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26807.html</URL>
        <Description>CVE-2024-26807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222801</URL>
        <Description>SUSE Bug 1222801</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86, relocs: Ignore relocations in .notes section

When building with CONFIG_XEN_PV=y, .text symbols are emitted into
the .notes section so that Xen can find the "startup_xen" entry point.
This information is used prior to booting the kernel, so relocations
are not useful. In fact, performing relocations against the .notes
section means that the KASLR base is exposed since /sys/kernel/notes
is world-readable.

To avoid leaking the KASLR base without breaking unprivileged tools that
are expecting to read /sys/kernel/notes, skip performing relocations in
the .notes section. The values readable in .notes are then identical to
those found in System.map.</Note>
    </Notes>
    <CVE>CVE-2024-26816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26816.html</URL>
        <Description>CVE-2024-26816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222624</URL>
        <Description>SUSE Bug 1222624</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

amdkfd: use calloc instead of kzalloc to avoid integer overflow

This uses calloc instead of doing the multiplication which might
overflow.</Note>
    </Notes>
    <CVE>CVE-2024-26817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26817.html</URL>
        <Description>CVE-2024-26817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222812</URL>
        <Description>SUSE Bug 1222812</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed

If hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER
handler cannot perform VF register successfully as the register call
is received before netvsc_probe is finished. This is because we
register register_netdevice_notifier() very early( even before
vmbus_driver_register()).
To fix this, we try to register each such matching VF( if it is visible
as a netdevice) at the end of netvsc_probe.</Note>
    </Notes>
    <CVE>CVE-2024-26820</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26820.html</URL>
        <Description>CVE-2024-26820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223078</URL>
        <Description>SUSE Bug 1223078</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="162">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: free rx_data_reassembly skb on NCI device cleanup

rx_data_reassembly skb is stored during NCI data exchange for processing
fragmented packets. It is dropped only when the last fragment is processed
or when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received.
However, the NCI device may be deallocated before that which leads to skb
leak.

As by design the rx_data_reassembly skb is bound to the NCI device and
nothing prevents the device to be freed before the skb is processed in
some way and cleaned, free it on the NCI device cleanup.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.</Note>
    </Notes>
    <CVE>CVE-2024-26825</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26825.html</URL>
        <Description>CVE-2024-26825</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223065</URL>
        <Description>SUSE Bug 1223065</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="163">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not allow untrusted VF to remove administratively set MAC

Currently when PF administratively sets VF's MAC address and the VF
is put down (VF tries to delete all MACs) then the MAC is removed
from MAC filters and primary VF MAC is zeroed.

Do not allow untrusted VF to remove primary MAC when it was set
administratively by PF.

Reproducer:
1) Create VF
2) Set VF interface up
3) Administratively set the VF's MAC
4) Put VF interface down

[root@host ~]# echo 1 &gt; /sys/class/net/enp2s0f0/device/sriov_numvfs
[root@host ~]# ip link set enp2s0f0v0 up
[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
[root@host ~]# ip link set enp2s0f0v0 down
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off</Note>
    </Notes>
    <CVE>CVE-2024-26830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26830.html</URL>
        <Description>CVE-2024-26830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223012</URL>
        <Description>SUSE Bug 1223012</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="164">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix memory leak in dm_sw_fini()

After destroying dmub_srv, the memory associated with it is
not freed, causing a memory leak:

unreferenced object 0xffff896302b45800 (size 1024):
  comm "(udev-worker)", pid 222, jiffies 4294894636
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 6265fd77):
    [&lt;ffffffff993495ed&gt;] kmalloc_trace+0x29d/0x340
    [&lt;ffffffffc0ea4a94&gt;] dm_dmub_sw_init+0xb4/0x450 [amdgpu]
    [&lt;ffffffffc0ea4e55&gt;] dm_sw_init+0x15/0x2b0 [amdgpu]
    [&lt;ffffffffc0ba8557&gt;] amdgpu_device_init+0x1417/0x24e0 [amdgpu]
    [&lt;ffffffffc0bab285&gt;] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]
    [&lt;ffffffffc0ba09c7&gt;] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]
    [&lt;ffffffff9968fd1e&gt;] local_pci_probe+0x3e/0x90
    [&lt;ffffffff996918a3&gt;] pci_device_probe+0xc3/0x230
    [&lt;ffffffff99805872&gt;] really_probe+0xe2/0x480
    [&lt;ffffffff99805c98&gt;] __driver_probe_device+0x78/0x160
    [&lt;ffffffff99805daf&gt;] driver_probe_device+0x1f/0x90
    [&lt;ffffffff9980601e&gt;] __driver_attach+0xce/0x1c0
    [&lt;ffffffff99803170&gt;] bus_for_each_dev+0x70/0xc0
    [&lt;ffffffff99804822&gt;] bus_add_driver+0x112/0x210
    [&lt;ffffffff99807245&gt;] driver_register+0x55/0x100
    [&lt;ffffffff990012d1&gt;] do_one_initcall+0x41/0x300

Fix this by freeing dmub_srv after destroying it.</Note>
    </Notes>
    <CVE>CVE-2024-26833</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26833.html</URL>
        <Description>CVE-2024-26833</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223036</URL>
        <Description>SUSE Bug 1223036</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="165">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix password opcode ordering for workstations

The Lenovo workstations require the password opcode to be run before
the attribute value is changed (if Admin password is enabled).

Tested on some Thinkpads to confirm they are OK with this order too.</Note>
    </Notes>
    <CVE>CVE-2024-26836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26836.html</URL>
        <Description>CVE-2024-26836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222968</URL>
        <Description>SUSE Bug 1222968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="166">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

efi: runtime: Fix potential overflow of soft-reserved region size

md_size will have been narrowed if we have &gt;= 4GB worth of pages in a
soft-reserved region.</Note>
    </Notes>
    <CVE>CVE-2024-26843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26843.html</URL>
        <Description>CVE-2024-26843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223014</URL>
        <Description>SUSE Bug 1223014</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="167">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-26848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26848.html</URL>
        <Description>CVE-2024-26848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223030</URL>
        <Description>SUSE Bug 1223030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="168">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: avoid possible UAF in ip6_route_mpath_notify()

syzbot found another use-after-free in ip6_route_mpath_notify() [1]

Commit f7225172f25a ("net/ipv6: prevent use after free in
ip6_route_mpath_notify") was not able to fix the root cause.

We need to defer the fib6_info_release() calls after
ip6_route_mpath_notify(), in the cleanup phase.

[1]
BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0
Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037

CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x167/0x540 mm/kasan/report.c:488
  kasan_report+0x142/0x180 mm/kasan/report.c:601
 rt6_fill_node+0x1460/0x1ac0
  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184
  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]
  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]
  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f73dd87dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005
RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858
 &lt;/TASK&gt;

Allocated by task 23037:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3981 [inline]
  __kmalloc+0x22e/0x490 mm/slub.c:3994
  kmalloc include/linux/slab.h:594 [inline]
  kzalloc include/linux/slab.h:711 [inline]
  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155
  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758
  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]
  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77

Freed by task 16:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
  poison_slab_object+0xa6/0xe0 m
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26852.html</URL>
        <Description>CVE-2024-26852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223057</URL>
        <Description>SUSE Bug 1223057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223059</URL>
        <Description>SUSE Bug 1223059</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="169">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

igc: avoid returning frame twice in XDP_REDIRECT

When a frame can not be transmitted in XDP_REDIRECT
(e.g. due to a full queue), it is necessary to free
it by calling xdp_return_frame_rx_napi.

However, this is the responsibility of the caller of
the ndo_xdp_xmit (see for example bq_xmit_all in
kernel/bpf/devmap.c) and thus calling it inside
igc_xdp_xmit (which is the ndo_xdp_xmit of the igc
driver) as well will lead to memory corruption.

In fact, bq_xmit_all expects that it can return all
frames after the last successfully transmitted one.
Therefore, break for the first not transmitted frame,
but do not call xdp_return_frame_rx_napi in igc_xdp_xmit.
This is equally implemented in other Intel drivers
such as the igb.

There are two alternatives to this that were rejected:
1. Return num_frames as all the frames would have been
   transmitted and release them inside igc_xdp_xmit.
   While it might work technically, it is not what
   the return value is meant to represent (i.e. the
   number of SUCCESSFULLY transmitted packets).
2. Rework kernel/bpf/devmap.c and all drivers to
   support non-consecutively dropped packets.
   Besides being complex, it likely has a negative
   performance impact without a significant gain
   since it is anyway unlikely that the next frame
   can be transmitted if the previous one was dropped.

The memory corruption can be reproduced with
the following script which leads to a kernel panic
after a few seconds.  It basically generates more
traffic than a i225 NIC can transmit and pushes it
via XDP_REDIRECT from a virtual interface to the
physical interface where frames get dropped.

   #!/bin/bash
   INTERFACE=enp4s0
   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`

   sudo ip link add dev veth1 type veth peer name veth2
   sudo ip link set up $INTERFACE
   sudo ip link set up veth1
   sudo ip link set up veth2

   cat &lt;&lt; EOF &gt; redirect.bpf.c

   SEC("prog")
   int redirect(struct xdp_md *ctx)
   {
       return bpf_redirect($INTERFACE_IDX, 0);
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o
   sudo ip link set veth2 xdp obj redirect.bpf.o

   cat &lt;&lt; EOF &gt; pass.bpf.c

   SEC("prog")
   int pass(struct xdp_md *ctx)
   {
       return XDP_PASS;
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o
   sudo ip link set $INTERFACE xdp obj pass.bpf.o

   cat &lt;&lt; EOF &gt; trafgen.cfg

   {
     /* Ethernet Header */
     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
     const16(ETH_P_IP),

     /* IPv4 Header */
     0b01000101, 0,   # IPv4 version, IHL, TOS
     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))
     const16(2),      # IPv4 ident
     0b01000000, 0,   # IPv4 flags, fragmentation off
     64,              # IPv4 TTL
     17,              # Protocol UDP
     csumip(14, 33),  # IPv4 checksum

     /* UDP Header */
     10,  0, 1, 1,    # IP Src - adapt as needed
     10,  0, 1, 2,    # IP Dest - adapt as needed
     const16(6666),   # UDP Src Port
     const16(6666),   # UDP Dest Port
     const16(1008),   # UDP length (UDP header 8 bytes + payload length)
     csumudp(14, 34), # UDP checksum

     /* Payload */
     fill('W', 1000),
   }
   EOF

   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp</Note>
    </Notes>
    <CVE>CVE-2024-26853</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26853.html</URL>
        <Description>CVE-2024-26853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223061</URL>
        <Description>SUSE Bug 1223061</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="170">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()

The function ice_bridge_setlink() may encounter a NULL pointer dereference
if nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently
in nla_for_each_nested(). To address this issue, add a check to ensure that
br_spec is not NULL before proceeding with the nested attribute iteration.</Note>
    </Notes>
    <CVE>CVE-2024-26855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26855.html</URL>
        <Description>CVE-2024-26855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223051</URL>
        <Description>SUSE Bug 1223051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="171">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: sparx5: Fix use after free inside sparx5_del_mact_entry

Based on the static analyzis of the code it looks like when an entry
from the MAC table was removed, the entry was still used after being
freed. More precise the vid of the mac_entry was used after calling
devm_kfree on the mac_entry.
The fix consists in first using the vid of the mac_entry to delete the
entry from the HW and after that to free it.</Note>
    </Notes>
    <CVE>CVE-2024-26856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26856.html</URL>
        <Description>CVE-2024-26856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223052</URL>
        <Description>SUSE Bug 1223052</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="172">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

geneve: make sure to pull inner header in geneve_rx()

syzbot triggered a bug in geneve_rx() [1]

Issue is similar to the one I fixed in commit 8d975c15c0cd
("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")

We have to save skb-&gt;network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.

pskb_inet_may_pull() makes sure the needed headers are in skb-&gt;head.

[1]
BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
 BUG: KMSAN: uninit-value in geneve_rx drivers/net/geneve.c:279 [inline]
 BUG: KMSAN: uninit-value in geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
  geneve_rx drivers/net/geneve.c:279 [inline]
  geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
  udp_queue_rcv_one_skb+0x1d39/0x1f20 net/ipv4/udp.c:2108
  udp_queue_rcv_skb+0x6ae/0x6e0 net/ipv4/udp.c:2186
  udp_unicast_rcv_skb+0x184/0x4b0 net/ipv4/udp.c:2346
  __udp4_lib_rcv+0x1c6b/0x3010 net/ipv4/udp.c:2422
  udp_rcv+0x7d/0xa0 net/ipv4/udp.c:2604
  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
  dst_input include/net/dst.h:461 [inline]
  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
  process_backlog+0x480/0x8b0 net/core/dev.c:5976
  __napi_poll+0xe3/0x980 net/core/dev.c:6576
  napi_poll net/core/dev.c:6645 [inline]
  net_rx_action+0x8b8/0x1870 net/core/dev.c:6778
  __do_softirq+0x1b7/0x7c5 kernel/softirq.c:553
  do_softirq+0x9a/0xf0 kernel/softirq.c:454
  __local_bh_enable_ip+0x9b/0xa0 kernel/softirq.c:381
  local_bh_enable include/linux/bottom_half.h:33 [inline]
  rcu_read_unlock_bh include/linux/rcupdate.h:820 [inline]
  __dev_queue_xmit+0x2768/0x51c0 net/core/dev.c:4378
  dev_queue_xmit include/linux/netdevice.h:3171 [inline]
  packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3081 [inline]
  packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  __sys_sendto+0x735/0xa10 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3819 [inline]
  slab_alloc_node mm/slub.c:3860 [inline]
  kmem_cache_alloc_node+0x5cb/0xbc0 mm/slub.c:3903
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
  __alloc_skb+0x352/0x790 net/core/skbuff.c:651
  alloc_skb include/linux/skbuff.h:1296 [inline]
  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6394
  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2783
  packet_alloc_skb net/packet/af_packet.c:2930 [inline]
  packet_snd net/packet/af_packet.c:3024 [inline]
  packet_sendmsg+0x70c2/0x9f10 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  __sys_sendto+0x735/0xa10 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b</Note>
    </Notes>
    <CVE>CVE-2024-26857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26857.html</URL>
        <Description>CVE-2024-26857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223058</URL>
        <Description>SUSE Bug 1223058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="173">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wireguard: receive: annotate data-race around receiving_counter.counter

Syzkaller with KCSAN identified a data-race issue when accessing
keypair-&gt;receiving_counter.counter. Use READ_ONCE() and WRITE_ONCE()
annotations to mark the data race as intentional.

    BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll

    write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0:
     counter_validate drivers/net/wireguard/receive.c:321 [inline]
     wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461
     __napi_poll+0x60/0x3b0 net/core/dev.c:6536
     napi_poll net/core/dev.c:6605 [inline]
     net_rx_action+0x32b/0x750 net/core/dev.c:6738
     __do_softirq+0xc4/0x279 kernel/softirq.c:553
     do_softirq+0x5e/0x90 kernel/softirq.c:454
     __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381
     __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
     _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
     spin_unlock_bh include/linux/spinlock.h:396 [inline]
     ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
     wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499
     process_one_work kernel/workqueue.c:2633 [inline]
     ...

    read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1:
     decrypt_packet drivers/net/wireguard/receive.c:252 [inline]
     wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501
     process_one_work kernel/workqueue.c:2633 [inline]
     process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706
     worker_thread+0x525/0x730 kernel/workqueue.c:2787
     ...</Note>
    </Notes>
    <CVE>CVE-2024-26861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26861.html</URL>
        <Description>CVE-2024-26861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223076</URL>
        <Description>SUSE Bug 1223076</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="174">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

packet: annotate data-races around ignore_outgoing

ignore_outgoing is read locklessly from dev_queue_xmit_nit()
and packet_getsockopt()

Add appropriate READ_ONCE()/WRITE_ONCE() annotations.

syzbot reported:

BUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt

write to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:
 packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003
 do_sock_setsockopt net/socket.c:2311 [inline]
 __sys_setsockopt+0x1d8/0x250 net/socket.c:2334
 __do_sys_setsockopt net/socket.c:2343 [inline]
 __se_sys_setsockopt net/socket.c:2340 [inline]
 __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

read to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:
 dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248
 xmit_one net/core/dev.c:3527 [inline]
 dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547
 __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108
 batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127
 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]
 batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]
 batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335
 worker_thread+0x526/0x730 kernel/workqueue.c:3416
 kthread+0x1d1/0x210 kernel/kthread.c:388
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243

value changed: 0x00 -&gt; 0x01

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet</Note>
    </Notes>
    <CVE>CVE-2024-26862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26862.html</URL>
        <Description>CVE-2024-26862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223111</URL>
        <Description>SUSE Bug 1223111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="175">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

spi: lpspi: Avoid potential use-after-free in probe()

fsl_lpspi_probe() is allocating/disposing memory manually with
spi_alloc_host()/spi_alloc_target(), but uses
devm_spi_register_controller(). In case of error after the latter call the
memory will be explicitly freed in the probe function by
spi_controller_put() call, but used afterwards by "devm" management outside
probe() (spi_unregister_controller() &lt;- devm_spi_unregister() below).

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070
...
Call trace:
 kernfs_find_ns
 kernfs_find_and_get_ns
 sysfs_remove_group
 sysfs_remove_groups
 device_remove_attrs
 device_del
 spi_unregister_controller
 devm_spi_unregister
 release_nodes
 devres_release_all
 really_probe
 driver_probe_device
 __device_attach_driver
 bus_for_each_drv
 __device_attach
 device_initial_probe
 bus_probe_device
 deferred_probe_work_func
 process_one_work
 worker_thread
 kthread
 ret_from_fork</Note>
    </Notes>
    <CVE>CVE-2024-26866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26866.html</URL>
        <Description>CVE-2024-26866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223024</URL>
        <Description>SUSE Bug 1223024</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="176">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Do not register event handler until srpt device is fully setup

Upon rare occasions, KASAN reports a use-after-free Write
in srpt_refresh_port().

This seems to be because an event handler is registered before the
srpt device is fully setup and a race condition upon error may leave a
partially setup event handler in place.

Instead, only register the event handler after srpt device initialization
is complete.</Note>
    </Notes>
    <CVE>CVE-2024-26872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26872.html</URL>
        <Description>CVE-2024-26872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223115</URL>
        <Description>SUSE Bug 1223115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="177">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: pvrusb2: fix uaf in pvr2_context_set_notify

[Syzbot reported]
BUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35
Read of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26

CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Workqueue: usb_hub_wq hub_event
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc4/0x620 mm/kasan/report.c:488
 kasan_report+0xda/0x110 mm/kasan/report.c:601
 pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35
 pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline]
 pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272

Freed by task 906:
kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640
poison_slab_object mm/kasan/common.c:241 [inline]
__kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257
kasan_slab_free include/linux/kasan.h:184 [inline]
slab_free_hook mm/slub.c:2121 [inline]
slab_free mm/slub.c:4299 [inline]
kfree+0x105/0x340 mm/slub.c:4409
pvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline]
pvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158

[Analyze]
Task A set disconnect_flag = !0, which resulted in Task B's condition being met
and releasing mp, leading to this issue.

[Fix]
Place the disconnect_flag assignment operation after all code in pvr2_context_disconnect()
to avoid this issue.</Note>
    </Notes>
    <CVE>CVE-2024-26875</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26875.html</URL>
        <Description>CVE-2024-26875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223118</URL>
        <Description>SUSE Bug 1223118</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="178">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

quota: Fix potential NULL pointer dereference

Below race may cause NULL pointer dereference

P1					P2
dquot_free_inode			quota_off
					  drop_dquot_ref
					   remove_dquot_ref
					   dquots = i_dquot(inode)
  dquots = i_dquot(inode)
  srcu_read_lock
  dquots[cnt]) != NULL (1)
					     dquots[type] = NULL (2)
  spin_lock(&amp;dquots[cnt]-&gt;dq_dqb_lock) (3)
   ....

If dquot_free_inode(or other routines) checks inode's quota pointers (1)
before quota_off sets it to NULL(2) and use it (3) after that, NULL pointer
dereference will be triggered.

So let's fix it by using a temporary pointer to avoid this issue.</Note>
    </Notes>
    <CVE>CVE-2024-26878</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26878.html</URL>
        <Description>CVE-2024-26878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223060</URL>
        <Description>SUSE Bug 1223060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="179">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: meson: Add missing clocks to axg_clk_regmaps

Some clocks were missing from axg_clk_regmaps, which caused kernel panic
during cat /sys/kernel/debug/clk/clk_summary

[   57.349402] Unable to handle kernel NULL pointer dereference at virtual address 00000000000001fc
...
[   57.430002] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   57.436900] pc : regmap_read+0x1c/0x88
[   57.440608] lr : clk_regmap_gate_is_enabled+0x3c/0xb0
[   57.445611] sp : ffff800082f1b690
[   57.448888] x29: ffff800082f1b690 x28: 0000000000000000 x27: ffff800080eb9a70
[   57.455961] x26: 0000000000000007 x25: 0000000000000016 x24: 0000000000000000
[   57.463033] x23: ffff800080e8b488 x22: 0000000000000015 x21: ffff00000e7e7000
[   57.470106] x20: ffff00000400ec00 x19: 0000000000000000 x18: ffffffffffffffff
[   57.477178] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0000042a3000
[   57.484251] x14: 0000000000000000 x13: ffff0000042a2fec x12: 0000000005f5e100
[   57.491323] x11: abcc77118461cefd x10: 0000000000000020 x9 : ffff8000805e4b24
[   57.498396] x8 : ffff0000028063c0 x7 : ffff800082f1b710 x6 : ffff800082f1b710
[   57.505468] x5 : 00000000ffffffd0 x4 : ffff800082f1b6e0 x3 : 0000000000001000
[   57.512541] x2 : ffff800082f1b6e4 x1 : 000000000000012c x0 : 0000000000000000
[   57.519615] Call trace:
[   57.522030]  regmap_read+0x1c/0x88
[   57.525393]  clk_regmap_gate_is_enabled+0x3c/0xb0
[   57.530050]  clk_core_is_enabled+0x44/0x120
[   57.534190]  clk_summary_show_subtree+0x154/0x2f0
[   57.538847]  clk_summary_show_subtree+0x220/0x2f0
[   57.543505]  clk_summary_show_subtree+0x220/0x2f0
[   57.548162]  clk_summary_show_subtree+0x220/0x2f0
[   57.552820]  clk_summary_show_subtree+0x220/0x2f0
[   57.557477]  clk_summary_show_subtree+0x220/0x2f0
[   57.562135]  clk_summary_show_subtree+0x220/0x2f0
[   57.566792]  clk_summary_show_subtree+0x220/0x2f0
[   57.571450]  clk_summary_show+0x84/0xb8
[   57.575245]  seq_read_iter+0x1bc/0x4b8
[   57.578954]  seq_read+0x8c/0xd0
[   57.582059]  full_proxy_read+0x68/0xc8
[   57.585767]  vfs_read+0xb0/0x268
[   57.588959]  ksys_read+0x70/0x108
[   57.592236]  __arm64_sys_read+0x24/0x38
[   57.596031]  invoke_syscall+0x50/0x128
[   57.599740]  el0_svc_common.constprop.0+0x48/0xf8
[   57.604397]  do_el0_svc+0x28/0x40
[   57.607675]  el0_svc+0x34/0xb8
[   57.610694]  el0t_64_sync_handler+0x13c/0x158
[   57.615006]  el0t_64_sync+0x190/0x198
[   57.618635] Code: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00)
[   57.624668] ---[ end trace 0000000000000000 ]---

[jbrunet: add missing Fixes tag]</Note>
    </Notes>
    <CVE>CVE-2024-26879</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26879.html</URL>
        <Description>CVE-2024-26879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223066</URL>
        <Description>SUSE Bug 1223066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="180">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when 1588 is received on HIP08 devices

The HIP08 devices does not register the ptp devices, so the
hdev-&gt;ptp is NULL, but the hardware can receive 1588 messages,
and set the HNS3_RXD_TS_VLD_B bit, so, if match this case, the
access of hdev-&gt;ptp-&gt;flags will cause a kernel crash:

[ 5888.946472] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
[ 5888.946475] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
...
[ 5889.266118] pc : hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]
[ 5889.272612] lr : hclge_ptp_get_rx_hwts+0x34/0x170 [hclge]
[ 5889.279101] sp : ffff800012c3bc50
[ 5889.283516] x29: ffff800012c3bc50 x28: ffff2040002be040
[ 5889.289927] x27: ffff800009116484 x26: 0000000080007500
[ 5889.296333] x25: 0000000000000000 x24: ffff204001c6f000
[ 5889.302738] x23: ffff204144f53c00 x22: 0000000000000000
[ 5889.309134] x21: 0000000000000000 x20: ffff204004220080
[ 5889.315520] x19: ffff204144f53c00 x18: 0000000000000000
[ 5889.321897] x17: 0000000000000000 x16: 0000000000000000
[ 5889.328263] x15: 0000004000140ec8 x14: 0000000000000000
[ 5889.334617] x13: 0000000000000000 x12: 00000000010011df
[ 5889.340965] x11: bbfeff4d22000000 x10: 0000000000000000
[ 5889.347303] x9 : ffff800009402124 x8 : 0200f78811dfbb4d
[ 5889.353637] x7 : 2200000000191b01 x6 : ffff208002a7d480
[ 5889.359959] x5 : 0000000000000000 x4 : 0000000000000000
[ 5889.366271] x3 : 0000000000000000 x2 : 0000000000000000
[ 5889.372567] x1 : 0000000000000000 x0 : ffff20400095c080
[ 5889.378857] Call trace:
[ 5889.382285] hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]
[ 5889.388304] hns3_handle_bdinfo+0x324/0x410 [hns3]
[ 5889.394055] hns3_handle_rx_bd+0x60/0x150 [hns3]
[ 5889.399624] hns3_clean_rx_ring+0x84/0x170 [hns3]
[ 5889.405270] hns3_nic_common_poll+0xa8/0x220 [hns3]
[ 5889.411084] napi_poll+0xcc/0x264
[ 5889.415329] net_rx_action+0xd4/0x21c
[ 5889.419911] __do_softirq+0x130/0x358
[ 5889.424484] irq_exit+0x134/0x154
[ 5889.428700] __handle_domain_irq+0x88/0xf0
[ 5889.433684] gic_handle_irq+0x78/0x2c0
[ 5889.438319] el1_irq+0xb8/0x140
[ 5889.442354] arch_cpu_idle+0x18/0x40
[ 5889.446816] default_idle_call+0x5c/0x1c0
[ 5889.451714] cpuidle_idle_call+0x174/0x1b0
[ 5889.456692] do_idle+0xc8/0x160
[ 5889.460717] cpu_startup_entry+0x30/0xfc
[ 5889.465523] secondary_start_kernel+0x158/0x1ec
[ 5889.470936] Code: 97ffab78 f9411c14 91408294 f9457284 (f9400c80)
[ 5889.477950] SMP: stopping secondary CPUs
[ 5890.514626] SMP: failed to stop secondary CPUs 0-69,71-95
[ 5890.522951] Starting crashdump kernel...</Note>
    </Notes>
    <CVE>CVE-2024-26881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26881.html</URL>
        <Description>CVE-2024-26881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223041</URL>
        <Description>SUSE Bug 1223041</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="181">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()

Apply the same fix than ones found in :

8d975c15c0cd ("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")
1ca1ba465e55 ("geneve: make sure to pull inner header in geneve_rx()")

We have to save skb-&gt;network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.

pskb_inet_may_pull() makes sure the needed headers are in skb-&gt;head.

syzbot reported:
BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
 BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
 BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
 BUG: KMSAN: uninit-value in ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
  ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
  __ipgre_rcv+0x9bc/0xbc0 net/ipv4/ip_gre.c:389
  ipgre_rcv net/ipv4/ip_gre.c:411 [inline]
  gre_rcv+0x423/0x19f0 net/ipv4/ip_gre.c:447
  gre_rcv+0x2a4/0x390 net/ipv4/gre_demux.c:163
  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
  dst_input include/net/dst.h:461 [inline]
  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
  netif_receive_skb_internal net/core/dev.c:5734 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5793
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1556
  tun_get_user+0x53b9/0x66e0 drivers/net/tun.c:2009
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
  call_write_iter include/linux/fs.h:2087 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb6b/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590
  alloc_pages_mpol+0x62b/0x9d0 mm/mempolicy.c:2133
  alloc_pages+0x1be/0x1e0 mm/mempolicy.c:2204
  skb_page_frag_refill+0x2bf/0x7c0 net/core/sock.c:2909
  tun_build_skb drivers/net/tun.c:1686 [inline]
  tun_get_user+0xe0a/0x66e0 drivers/net/tun.c:1826
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
  call_write_iter include/linux/fs.h:2087 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb6b/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b</Note>
    </Notes>
    <CVE>CVE-2024-26882</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26882.html</URL>
        <Description>CVE-2024-26882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223034</URL>
        <Description>SUSE Bug 1223034</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="182">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check on 32-bit arches

The stackmap code relies on roundup_pow_of_two() to compute the number
of hash buckets, and contains an overflow check by checking if the
resulting value is 0. However, on 32-bit arches, the roundup code itself
can overflow by doing a 32-bit left-shift of an unsigned long value,
which is undefined behaviour, so it is not guaranteed to truncate
neatly. This was triggered by syzbot on the DEVMAP_HASH type, which
contains the same check, copied from the hashtab code.

The commit in the fixes tag actually attempted to fix this, but the fix
did not account for the UB, so the fix only works on CPUs where an
overflow does result in a neat truncation to zero, which is not
guaranteed. Checking the value before rounding does not have this
problem.</Note>
    </Notes>
    <CVE>CVE-2024-26883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26883.html</URL>
        <Description>CVE-2024-26883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223035</URL>
        <Description>SUSE Bug 1223035</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="183">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix hashtab overflow check on 32-bit arches

The hashtab code relies on roundup_pow_of_two() to compute the number of
hash buckets, and contains an overflow check by checking if the
resulting value is 0. However, on 32-bit arches, the roundup code itself
can overflow by doing a 32-bit left-shift of an unsigned long value,
which is undefined behaviour, so it is not guaranteed to truncate
neatly. This was triggered by syzbot on the DEVMAP_HASH type, which
contains the same check, copied from the hashtab code. So apply the same
fix to hashtab, by moving the overflow check to before the roundup.</Note>
    </Notes>
    <CVE>CVE-2024-26884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26884.html</URL>
        <Description>CVE-2024-26884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223189</URL>
        <Description>SUSE Bug 1223189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="184">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix DEVMAP_HASH overflow check on 32-bit arches

The devmap code allocates a number hash buckets equal to the next power
of two of the max_entries value provided when creating the map. When
rounding up to the next power of two, the 32-bit variable storing the
number of buckets can overflow, and the code checks for overflow by
checking if the truncated 32-bit value is equal to 0. However, on 32-bit
arches the rounding up itself can overflow mid-way through, because it
ends up doing a left-shift of 32 bits on an unsigned long value. If the
size of an unsigned long is four bytes, this is undefined behaviour, so
there is no guarantee that we'll end up with a nice and tidy 0-value at
the end.

Syzbot managed to turn this into a crash on arm32 by creating a
DEVMAP_HASH with max_entries &gt; 0x80000000 and then trying to update it.
Fix this by moving the overflow check to before the rounding up
operation.</Note>
    </Notes>
    <CVE>CVE-2024-26885</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26885.html</URL>
        <Description>CVE-2024-26885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223190</URL>
        <Description>SUSE Bug 1223190</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="185">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected

For those endpoint devices connect to system via hotplug capable ports,
users could request a hot reset to the device by flapping device's link
through setting the slot's link control register, as pciehp_ist() DLLSC
interrupt sequence response, pciehp will unload the device driver and
then power it off. thus cause an IOMMU device-TLB invalidation (Intel
VT-d spec, or ATS Invalidation in PCIe spec r6.1) request for non-existence
target device to be sent and deadly loop to retry that request after ITE
fault triggered in interrupt context.

That would cause following continuous hard lockup warning and system hang

[ 4211.433662] pcieport 0000:17:01.0: pciehp: Slot(108): Link Down
[ 4211.433664] pcieport 0000:17:01.0: pciehp: Slot(108): Card not present
[ 4223.822591] NMI watchdog: Watchdog detected hard LOCKUP on cpu 144
[ 4223.822622] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S
         OE    kernel version xxxx
[ 4223.822623] Hardware name: vendorname xxxx 666-106,
BIOS 01.01.02.03.01 05/15/2023
[ 4223.822623] RIP: 0010:qi_submit_sync+0x2c0/0x490
[ 4223.822624] Code: 48 be 00 00 00 00 00 08 00 00 49 85 74 24 20 0f 95 c1 48 8b
 57 10 83 c1 04 83 3c 1a 03 0f 84 a2 01 00 00 49 8b 04 24 8b 70 34 &lt;40&gt; f6 c6 1
0 74 17 49 8b 04 24 8b 80 80 00 00 00 89 c2 d3 fa 41 39
[ 4223.822624] RSP: 0018:ffffc4f074f0bbb8 EFLAGS: 00000093
[ 4223.822625] RAX: ffffc4f040059000 RBX: 0000000000000014 RCX: 0000000000000005
[ 4223.822625] RDX: ffff9f3841315800 RSI: 0000000000000000 RDI: ffff9f38401a8340
[ 4223.822625] RBP: ffff9f38401a8340 R08: ffffc4f074f0bc00 R09: 0000000000000000
[ 4223.822626] R10: 0000000000000010 R11: 0000000000000018 R12: ffff9f384005e200
[ 4223.822626] R13: 0000000000000004 R14: 0000000000000046 R15: 0000000000000004
[ 4223.822626] FS:  0000000000000000(0000) GS:ffffa237ae400000(0000)
knlGS:0000000000000000
[ 4223.822627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4223.822627] CR2: 00007ffe86515d80 CR3: 000002fd3000a001 CR4: 0000000000770ee0
[ 4223.822627] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4223.822628] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 4223.822628] PKRU: 55555554
[ 4223.822628] Call Trace:
[ 4223.822628]  qi_flush_dev_iotlb+0xb1/0xd0
[ 4223.822628]  __dmar_remove_one_dev_info+0x224/0x250
[ 4223.822629]  dmar_remove_one_dev_info+0x3e/0x50
[ 4223.822629]  intel_iommu_release_device+0x1f/0x30
[ 4223.822629]  iommu_release_device+0x33/0x60
[ 4223.822629]  iommu_bus_notifier+0x7f/0x90
[ 4223.822630]  blocking_notifier_call_chain+0x60/0x90
[ 4223.822630]  device_del+0x2e5/0x420
[ 4223.822630]  pci_remove_bus_device+0x70/0x110
[ 4223.822630]  pciehp_unconfigure_device+0x7c/0x130
[ 4223.822631]  pciehp_disable_slot+0x6b/0x100
[ 4223.822631]  pciehp_handle_presence_or_link_change+0xd8/0x320
[ 4223.822631]  pciehp_ist+0x176/0x180
[ 4223.822631]  ? irq_finalize_oneshot.part.50+0x110/0x110
[ 4223.822632]  irq_thread_fn+0x19/0x50
[ 4223.822632]  irq_thread+0x104/0x190
[ 4223.822632]  ? irq_forced_thread_fn+0x90/0x90
[ 4223.822632]  ? irq_thread_check_affinity+0xe0/0xe0
[ 4223.822633]  kthread+0x114/0x130
[ 4223.822633]  ? __kthread_cancel_work+0x40/0x40
[ 4223.822633]  ret_from_fork+0x1f/0x30
[ 4223.822633] Kernel panic - not syncing: Hard LOCKUP
[ 4223.822634] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S
         OE     kernel version xxxx
[ 4223.822634] Hardware name: vendorname xxxx 666-106,
BIOS 01.01.02.03.01 05/15/2023
[ 4223.822634] Call Trace:
[ 4223.822634]  &lt;NMI&gt;
[ 4223.822635]  dump_stack+0x6d/0x88
[ 4223.822635]  panic+0x101/0x2d0
[ 4223.822635]  ? ret_from_fork+0x11/0x30
[ 4223.822635]  nmi_panic.cold.14+0xc/0xc
[ 4223.822636]  watchdog_overflow_callback.cold.8+0x6d/0x81
[ 4223.822636]  __perf_event_overflow+0x4f/0xf0
[ 4223.822636]  handle_pmi_common
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26891</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26891.html</URL>
        <Description>CVE-2024-26891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223037</URL>
        <Description>SUSE Bug 1223037</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="186">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Fix double free in SMC transport cleanup path

When the generic SCMI code tears down a channel, it calls the chan_free
callback function, defined by each transport. Since multiple protocols
might share the same transport_info member, chan_free() might want to
clean up the same member multiple times within the given SCMI transport
implementation. In this case, it is SMC transport. This will lead to a NULL
pointer dereference at the second time:

    | scmi_protocol scmi_dev.1: Enabled polling mode TX channel - prot_id:16
    | arm-scmi firmware:scmi: SCMI Notifications - Core Enabled.
    | arm-scmi firmware:scmi: unable to communicate with SCMI
    | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
    | Mem abort info:
    |   ESR = 0x0000000096000004
    |   EC = 0x25: DABT (current EL), IL = 32 bits
    |   SET = 0, FnV = 0
    |   EA = 0, S1PTW = 0
    |   FSC = 0x04: level 0 translation fault
    | Data abort info:
    |   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
    |   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    |   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
    | user pgtable: 4k pages, 48-bit VAs, pgdp=0000000881ef8000
    | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
    | Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
    | Modules linked in:
    | CPU: 4 PID: 1 Comm: swapper/0 Not tainted 6.7.0-rc2-00124-g455ef3d016c9-dirty #793
    | Hardware name: FVP Base RevC (DT)
    | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
    | pc : smc_chan_free+0x3c/0x6c
    | lr : smc_chan_free+0x3c/0x6c
    | Call trace:
    |  smc_chan_free+0x3c/0x6c
    |  idr_for_each+0x68/0xf8
    |  scmi_cleanup_channels.isra.0+0x2c/0x58
    |  scmi_probe+0x434/0x734
    |  platform_probe+0x68/0xd8
    |  really_probe+0x110/0x27c
    |  __driver_probe_device+0x78/0x12c
    |  driver_probe_device+0x3c/0x118
    |  __driver_attach+0x74/0x128
    |  bus_for_each_dev+0x78/0xe0
    |  driver_attach+0x24/0x30
    |  bus_add_driver+0xe4/0x1e8
    |  driver_register+0x60/0x128
    |  __platform_driver_register+0x28/0x34
    |  scmi_driver_init+0x84/0xc0
    |  do_one_initcall+0x78/0x33c
    |  kernel_init_freeable+0x2b8/0x51c
    |  kernel_init+0x24/0x130
    |  ret_from_fork+0x10/0x20
    | Code: f0004701 910a0021 aa1403e5 97b91c70 (b9400280)
    | ---[ end trace 0000000000000000 ]---

Simply check for the struct pointer being NULL before trying to access
its members, to avoid this situation.

This was found when a transport doesn't really work (for instance no SMC
service), the probe routines then tries to clean up, and triggers a crash.</Note>
    </Notes>
    <CVE>CVE-2024-26893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26893.html</URL>
        <Description>CVE-2024-26893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223196</URL>
        <Description>SUSE Bug 1223196</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="187">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces

wilc_netdev_cleanup currently triggers a KASAN warning, which can be
observed on interface registration error path, or simply by
removing the module/unbinding device from driver:

echo spi0.1 &gt; /sys/bus/spi/drivers/wilc1000_spi/unbind

==================================================================
BUG: KASAN: slab-use-after-free in wilc_netdev_cleanup+0x508/0x5cc
Read of size 4 at addr c54d1ce8 by task sh/86

CPU: 0 PID: 86 Comm: sh Not tainted 6.8.0-rc1+ #117
Hardware name: Atmel SAMA5
 unwind_backtrace from show_stack+0x18/0x1c
 show_stack from dump_stack_lvl+0x34/0x58
 dump_stack_lvl from print_report+0x154/0x500
 print_report from kasan_report+0xac/0xd8
 kasan_report from wilc_netdev_cleanup+0x508/0x5cc
 wilc_netdev_cleanup from wilc_bus_remove+0xc8/0xec
 wilc_bus_remove from spi_remove+0x8c/0xac
 spi_remove from device_release_driver_internal+0x434/0x5f8
 device_release_driver_internal from unbind_store+0xbc/0x108
 unbind_store from kernfs_fop_write_iter+0x398/0x584
 kernfs_fop_write_iter from vfs_write+0x728/0xf88
 vfs_write from ksys_write+0x110/0x1e4
 ksys_write from ret_fast_syscall+0x0/0x1c

[...]

Allocated by task 1:
 kasan_save_track+0x30/0x5c
 __kasan_kmalloc+0x8c/0x94
 __kmalloc_node+0x1cc/0x3e4
 kvmalloc_node+0x48/0x180
 alloc_netdev_mqs+0x68/0x11dc
 alloc_etherdev_mqs+0x28/0x34
 wilc_netdev_ifc_init+0x34/0x8ec
 wilc_cfg80211_init+0x690/0x910
 wilc_bus_probe+0xe0/0x4a0
 spi_probe+0x158/0x1b0
 really_probe+0x270/0xdf4
 __driver_probe_device+0x1dc/0x580
 driver_probe_device+0x60/0x140
 __driver_attach+0x228/0x5d4
 bus_for_each_dev+0x13c/0x1a8
 bus_add_driver+0x2a0/0x608
 driver_register+0x24c/0x578
 do_one_initcall+0x180/0x310
 kernel_init_freeable+0x424/0x484
 kernel_init+0x20/0x148
 ret_from_fork+0x14/0x28

Freed by task 86:
 kasan_save_track+0x30/0x5c
 kasan_save_free_info+0x38/0x58
 __kasan_slab_free+0xe4/0x140
 kfree+0xb0/0x238
 device_release+0xc0/0x2a8
 kobject_put+0x1d4/0x46c
 netdev_run_todo+0x8fc/0x11d0
 wilc_netdev_cleanup+0x1e4/0x5cc
 wilc_bus_remove+0xc8/0xec
 spi_remove+0x8c/0xac
 device_release_driver_internal+0x434/0x5f8
 unbind_store+0xbc/0x108
 kernfs_fop_write_iter+0x398/0x584
 vfs_write+0x728/0xf88
 ksys_write+0x110/0x1e4
 ret_fast_syscall+0x0/0x1c
 [...]

David Mosberger-Tan initial investigation [1] showed that this
use-after-free is due to netdevice unregistration during vif list
traversal. When unregistering a net device, since the needs_free_netdev has
been set to true during registration, the netdevice object is also freed,
and as a consequence, the corresponding vif object too, since it is
attached to it as private netdevice data. The next occurrence of the loop
then tries to access freed vif pointer to the list to move forward in the
list.

Fix this use-after-free thanks to two mechanisms:
- navigate in the list with list_for_each_entry_safe, which allows to
  safely modify the list as we go through each element. For each element,
  remove it from the list with list_del_rcu
- make sure to wait for RCU grace period end after each vif removal to make
  sure it is safe to free the corresponding vif too (through
  unregister_netdev)

Since we are in a RCU "modifier" path (not a "reader" path), and because
such path is expected not to be concurrent to any other modifier (we are
using the vif_mutex lock), we do not need to use RCU list API, that's why
we can benefit from list_for_each_entry_safe.

[1] https://lore.kernel.org/linux-wireless/ab077dbe58b1ea5de0a3b2ca21f275a07af967d2.camel@egauge.net/</Note>
    </Notes>
    <CVE>CVE-2024-26895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26895.html</URL>
        <Description>CVE-2024-26895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223197</URL>
        <Description>SUSE Bug 1223197</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="188">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: wfx: fix memory leak when starting AP

Kmemleak reported this error:

    unreferenced object 0xd73d1180 (size 184):
      comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.245s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        00 00 00 00 00 00 00 00 1e 00 01 00 00 00 00 00  ................
      backtrace:
        [&lt;5ca11420&gt;] kmem_cache_alloc+0x20c/0x5ac
        [&lt;127bdd74&gt;] __alloc_skb+0x144/0x170
        [&lt;fb8a5e38&gt;] __netdev_alloc_skb+0x50/0x180
        [&lt;0f9fa1d5&gt;] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]
        [&lt;7accd02d&gt;] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]
        [&lt;41e25cc3&gt;] wfx_start_ap+0xc8/0x234 [wfx]
        [&lt;93a70356&gt;] ieee80211_start_ap+0x404/0x6b4 [mac80211]
        [&lt;a4a661cd&gt;] nl80211_start_ap+0x76c/0x9e0 [cfg80211]
        [&lt;47bd8b68&gt;] genl_rcv_msg+0x198/0x378
        [&lt;453ef796&gt;] netlink_rcv_skb+0xd0/0x130
        [&lt;6b7c977a&gt;] genl_rcv+0x34/0x44
        [&lt;66b2d04d&gt;] netlink_unicast+0x1b4/0x258
        [&lt;f965b9b6&gt;] netlink_sendmsg+0x1e8/0x428
        [&lt;aadb8231&gt;] ____sys_sendmsg+0x1e0/0x274
        [&lt;d2b5212d&gt;] ___sys_sendmsg+0x80/0xb4
        [&lt;69954f45&gt;] __sys_sendmsg+0x64/0xa8
    unreferenced object 0xce087000 (size 1024):
      comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.246s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        10 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............
      backtrace:
        [&lt;9a993714&gt;] __kmalloc_track_caller+0x230/0x600
        [&lt;f83ea192&gt;] kmalloc_reserve.constprop.0+0x30/0x74
        [&lt;a2c61343&gt;] __alloc_skb+0xa0/0x170
        [&lt;fb8a5e38&gt;] __netdev_alloc_skb+0x50/0x180
        [&lt;0f9fa1d5&gt;] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]
        [&lt;7accd02d&gt;] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]
        [&lt;41e25cc3&gt;] wfx_start_ap+0xc8/0x234 [wfx]
        [&lt;93a70356&gt;] ieee80211_start_ap+0x404/0x6b4 [mac80211]
        [&lt;a4a661cd&gt;] nl80211_start_ap+0x76c/0x9e0 [cfg80211]
        [&lt;47bd8b68&gt;] genl_rcv_msg+0x198/0x378
        [&lt;453ef796&gt;] netlink_rcv_skb+0xd0/0x130
        [&lt;6b7c977a&gt;] genl_rcv+0x34/0x44
        [&lt;66b2d04d&gt;] netlink_unicast+0x1b4/0x258
        [&lt;f965b9b6&gt;] netlink_sendmsg+0x1e8/0x428
        [&lt;aadb8231&gt;] ____sys_sendmsg+0x1e0/0x274
        [&lt;d2b5212d&gt;] ___sys_sendmsg+0x80/0xb4

However, since the kernel is build optimized, it seems the stack is not
accurate. It appears the issue is related to wfx_set_mfp_ap(). The issue
is obvious in this function: memory allocated by ieee80211_beacon_get()
is never released. Fixing this leak makes kmemleak happy.</Note>
    </Notes>
    <CVE>CVE-2024-26896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26896.html</URL>
        <Description>CVE-2024-26896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223042</URL>
        <Description>SUSE Bug 1223042</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="189">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete

The ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data
structures have been fully initialised by the time it runs. However, because of
the order in which things are initialised, this is not guaranteed to be the
case, because the device is exposed to the USB subsystem before the ath9k driver
initialisation is completed.

We already committed a partial fix for this in commit:
8b3046abc99e ("ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()")

However, that commit only aborted the WMI_TXSTATUS_EVENTID command in the event
tasklet, pairing it with an "initialisation complete" bit in the TX struct. It
seems syzbot managed to trigger the race for one of the other commands as well,
so let's just move the existing synchronisation bit to cover the whole
tasklet (setting it at the end of ath9k_htc_probe_device() instead of inside
ath9k_tx_init()).</Note>
    </Notes>
    <CVE>CVE-2024-26897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26897.html</URL>
        <Description>CVE-2024-26897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223323</URL>
        <Description>SUSE Bug 1223323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="190">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts

This patch is against CVE-2023-6270. The description of cve is:

  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux
  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on
  `struct net_device`, and a use-after-free can be triggered by racing
  between the free on the struct and the access through the `skbtxq`
  global queue. This could lead to a denial of service condition or
  potential code execution.

In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial
code is finished. But the net_device ifp will still be used in
later tx()-&gt;dev_queue_xmit() in kthread. Which means that the
dev_put(ifp) should NOT be called in the success path of skb
initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into
use-after-free because the net_device is freed.

This patch removed the dev_put(ifp) in the success path in
aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().</Note>
    </Notes>
    <CVE>CVE-2024-26898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26898.html</URL>
        <Description>CVE-2024-26898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218562</URL>
        <Description>SUSE Bug 1218562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223016</URL>
        <Description>SUSE Bug 1223016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223017</URL>
        <Description>SUSE Bug 1223017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="191">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak

syzbot identified a kernel information leak vulnerability in
do_sys_name_to_handle() and issued the following report [1].

[1]
"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 _copy_to_user+0xbc/0x100 lib/usercopy.c:40
 copy_to_user include/linux/uaccess.h:191 [inline]
 do_sys_name_to_handle fs/fhandle.c:73 [inline]
 __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]
 __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94
 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94
 ...

Uninit was created at:
 slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
 slab_alloc_node mm/slub.c:3478 [inline]
 __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517
 __do_kmalloc_node mm/slab_common.c:1006 [inline]
 __kmalloc+0x121/0x3c0 mm/slab_common.c:1020
 kmalloc include/linux/slab.h:604 [inline]
 do_sys_name_to_handle fs/fhandle.c:39 [inline]
 __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]
 __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94
 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94
 ...

Bytes 18-19 of 20 are uninitialized
Memory access of size 20 starts at ffff888128a46380
Data copied to user address 0000000020000240"

Per Chuck Lever's suggestion, use kzalloc() instead of kmalloc() to
solve the problem.</Note>
    </Notes>
    <CVE>CVE-2024-26901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26901.html</URL>
        <Description>CVE-2024-26901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223198</URL>
        <Description>SUSE Bug 1223198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="192">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security

During our fuzz testing of the connection and disconnection process at the
RFCOMM layer, we discovered this bug. By comparing the packets from a
normal connection and disconnection process with the testcase that
triggered a KASAN report. We analyzed the cause of this bug as follows:

1. In the packets captured during a normal connection, the host sends a
`Read Encryption Key Size` type of `HCI_CMD` packet
(Command Opcode: 0x1408) to the controller to inquire the length of
encryption key.After receiving this packet, the controller immediately
replies with a Command Completepacket (Event Code: 0x0e) to return the
Encryption Key Size.

2. In our fuzz test case, the timing of the controller's response to this
packet was delayed to an unexpected point: after the RFCOMM and L2CAP
layers had disconnected but before the HCI layer had disconnected.

3. After receiving the Encryption Key Size Response at the time described
in point 2, the host still called the rfcomm_check_security function.
However, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-&gt;chan-&gt;conn;`
had already been released, and when the function executed
`return hci_conn_security(conn-&gt;hcon, d-&gt;sec_level, auth_type, d-&gt;out);`,
specifically when accessing `conn-&gt;hcon`, a null-ptr-deref error occurred.

To fix this bug, check if `sk-&gt;sk_state` is BT_CLOSED before calling
rfcomm_recv_frame in rfcomm_process_rx.</Note>
    </Notes>
    <CVE>CVE-2024-26903</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26903.html</URL>
        <Description>CVE-2024-26903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223187</URL>
        <Description>SUSE Bug 1223187</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="193">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: Revert "scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock"

This reverts commit 1a1975551943f681772720f639ff42fbaa746212.

This commit causes interrupts to be lost for FCoE devices, since it changed
sping locks from "bh" to "irqsave".

Instead, a work queue should be used, and will be addressed in a separate
commit.</Note>
    </Notes>
    <CVE>CVE-2024-26917</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26917.html</URL>
        <Description>CVE-2024-26917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223056</URL>
        <Description>SUSE Bug 1223056</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="194">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Add some bounds checking to firmware data

Smatch complains about "head-&gt;full_size - head-&gt;header_size" can
underflow.  To some extent, we're always going to have to trust the
firmware a bit.  However, it's easy enough to add a check for negatives,
and let's add a upper bounds check as well.</Note>
    </Notes>
    <CVE>CVE-2024-26927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26927.html</URL>
        <Description>CVE-2024-26927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223525</URL>
        <Description>SUSE Bug 1223525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="195">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add a dc_state NULL check in dc_state_release

[How]
Check wheather state is NULL before releasing it.</Note>
    </Notes>
    <CVE>CVE-2024-26948</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26948.html</URL>
        <Description>CVE-2024-26948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223664</URL>
        <Description>SUSE Bug 1223664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="196">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: access device through ctx instead of peer

The previous commit fixed a bug that led to a NULL peer-&gt;device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx-&gt;wg. This semantically makes more sense
too, since ctx-&gt;wg-&gt;peer_allowedips.seq is compared with
ctx-&gt;allowedips_seq, basing them both in ctx. This also acts as a
defence in depth provision against freed peers.</Note>
    </Notes>
    <CVE>CVE-2024-26950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26950.html</URL>
        <Description>CVE-2024-26950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223661</URL>
        <Description>SUSE Bug 1223661</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="197">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: check for dangling peer via is_dead instead of empty list

If all peers are removed via wg_peer_remove_all(), rather than setting
peer_list to empty, the peer is added to a temporary list with a head on
the stack of wg_peer_remove_all(). If a netlink dump is resumed and the
cursored peer is one that has been removed via wg_peer_remove_all(), it
will iterate from that peer and then attempt to dump freed peers.

Fix this by instead checking peer-&gt;is_dead, which was explictly created
for this purpose. Also move up the device_update_lock lockdep assertion,
since reading is_dead relies on that.

It can be reproduced by a small script like:

    echo "Setting config..."
    ip link add dev wg0 type wireguard
    wg setconf wg0 /big-config
    (
            while true; do
                    echo "Showing config..."
                    wg showconf wg0 &gt; /dev/null
            done
    ) &amp;
    sleep 4
    wg setconf wg0 &lt;(printf "[Peer]\nPublicKey=$(wg genkey)\n")

Resulting in:

    BUG: KASAN: slab-use-after-free in __lock_acquire+0x182a/0x1b20
    Read of size 8 at addr ffff88811956ec70 by task wg/59
    CPU: 2 PID: 59 Comm: wg Not tainted 6.8.0-rc2-debug+ #5
    Call Trace:
     &lt;TASK&gt;
     dump_stack_lvl+0x47/0x70
     print_address_description.constprop.0+0x2c/0x380
     print_report+0xab/0x250
     kasan_report+0xba/0xf0
     __lock_acquire+0x182a/0x1b20
     lock_acquire+0x191/0x4b0
     down_read+0x80/0x440
     get_peer+0x140/0xcb0
     wg_get_device_dump+0x471/0x1130</Note>
    </Notes>
    <CVE>CVE-2024-26951</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26951.html</URL>
        <Description>CVE-2024-26951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223660</URL>
        <Description>SUSE Bug 1223660</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="198">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: prevent kernel bug at submit_bh_wbc()

Fix a bug where nilfs_get_block() returns a successful status when
searching and inserting the specified block both fail inconsistently.  If
this inconsistent behavior is not due to a previously fixed bug, then an
unexpected race is occurring, so return a temporary error -EAGAIN instead.

This prevents callers such as __block_write_begin_int() from requesting a
read into a buffer that is not mapped, which would cause the BUG_ON check
for the BH_Mapped flag in submit_bh_wbc() to fail.</Note>
    </Notes>
    <CVE>CVE-2024-26955</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26955.html</URL>
        <Description>CVE-2024-26955</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223657</URL>
        <Description>SUSE Bug 1223657</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="199">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix failure to detect DAT corruption in btree and direct mappings

Patch series "nilfs2: fix kernel bug at submit_bh_wbc()".

This resolves a kernel BUG reported by syzbot.  Since there are two
flaws involved, I've made each one a separate patch.

The first patch alone resolves the syzbot-reported bug, but I think
both fixes should be sent to stable, so I've tagged them as such.


This patch (of 2):

Syzbot has reported a kernel bug in submit_bh_wbc() when writing file data
to a nilfs2 file system whose metadata is corrupted.

There are two flaws involved in this issue.

The first flaw is that when nilfs_get_block() locates a data block using
btree or direct mapping, if the disk address translation routine
nilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata
corruption, it can be passed back to nilfs_get_block().  This causes
nilfs_get_block() to misidentify an existing block as non-existent,
causing both data block lookup and insertion to fail inconsistently.

The second flaw is that nilfs_get_block() returns a successful status in
this inconsistent state.  This causes the caller __block_write_begin_int()
or others to request a read even though the buffer is not mapped,
resulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()
failing.

This fixes the first issue by changing the return value to code -EINVAL
when a conversion using DAT fails with code -ENOENT, avoiding the
conflicting condition that leads to the kernel bug described above.  Here,
code -EINVAL indicates that metadata corruption was detected during the
block lookup, which will be properly handled as a file system error and
converted to -EIO when passing through the nilfs2 bmap layer.</Note>
    </Notes>
    <CVE>CVE-2024-26956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26956.html</URL>
        <Description>CVE-2024-26956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223663</URL>
        <Description>SUSE Bug 1223663</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="200">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: swap: fix race between free_swap_and_cache() and swapoff()

There was previously a theoretical window where swapoff() could run and
teardown a swap_info_struct while a call to free_swap_and_cache() was
running in another thread.  This could cause, amongst other bad
possibilities, swap_page_trans_huge_swapped() (called by
free_swap_and_cache()) to access the freed memory for swap_map.

This is a theoretical problem and I haven't been able to provoke it from a
test case.  But there has been agreement based on code review that this is
possible (see link below).

Fix it by using get_swap_device()/put_swap_device(), which will stall
swapoff().  There was an extra check in _swap_info_get() to confirm that
the swap entry was not free.  This isn't present in get_swap_device()
because it doesn't make sense in general due to the race between getting
the reference and swapoff.  So I've added an equivalent check directly in
free_swap_and_cache().

Details of how to provoke one possible issue (thanks to David Hildenbrand
for deriving this):

--8&lt;-----

__swap_entry_free() might be the last user and result in
"count == SWAP_HAS_CACHE".

swapoff-&gt;try_to_unuse() will stop as soon as soon as si-&gt;inuse_pages==0.

So the question is: could someone reclaim the folio and turn
si-&gt;inuse_pages==0, before we completed swap_page_trans_huge_swapped().

Imagine the following: 2 MiB folio in the swapcache. Only 2 subpages are
still references by swap entries.

Process 1 still references subpage 0 via swap entry.
Process 2 still references subpage 1 via swap entry.

Process 1 quits. Calls free_swap_and_cache().
-&gt; count == SWAP_HAS_CACHE
[then, preempted in the hypervisor etc.]

Process 2 quits. Calls free_swap_and_cache().
-&gt; count == SWAP_HAS_CACHE

Process 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls
__try_to_reclaim_swap().

__try_to_reclaim_swap()-&gt;folio_free_swap()-&gt;delete_from_swap_cache()-&gt;
put_swap_folio()-&gt;free_swap_slot()-&gt;swapcache_free_entries()-&gt;
swap_entry_free()-&gt;swap_range_free()-&gt;
...
WRITE_ONCE(si-&gt;inuse_pages, si-&gt;inuse_pages - nr_entries);

What stops swapoff to succeed after process 2 reclaimed the swap cache
but before process1 finished its call to swap_page_trans_huge_swapped()?

--8&lt;-----</Note>
    </Notes>
    <CVE>CVE-2024-26960</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26960.html</URL>
        <Description>CVE-2024-26960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223655</URL>
        <Description>SUSE Bug 1223655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="201">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.</Note>
    </Notes>
    <CVE>CVE-2024-26965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26965.html</URL>
        <Description>CVE-2024-26965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223648</URL>
        <Description>SUSE Bug 1223648</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="202">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.</Note>
    </Notes>
    <CVE>CVE-2024-26966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26966.html</URL>
        <Description>CVE-2024-26966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223646</URL>
        <Description>SUSE Bug 1223646</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="203">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.</Note>
    </Notes>
    <CVE>CVE-2024-26969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26969.html</URL>
        <Description>CVE-2024-26969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223645</URL>
        <Description>SUSE Bug 1223645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="204">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.</Note>
    </Notes>
    <CVE>CVE-2024-26970</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26970.html</URL>
        <Description>CVE-2024-26970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223644</URL>
        <Description>SUSE Bug 1223644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="205">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-26972</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26972.html</URL>
        <Description>CVE-2024-26972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223643</URL>
        <Description>SUSE Bug 1223643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="206">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix OOB in nilfs_set_de_type

The size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is
defined as "S_IFMT &gt;&gt; S_SHIFT", but the nilfs_set_de_type() function,
which uses this array, specifies the index to read from the array in the
same way as "(mode &amp; S_IFMT) &gt;&gt; S_SHIFT".

static void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode
 *inode)
{
	umode_t mode = inode-&gt;i_mode;

	de-&gt;file_type = nilfs_type_by_mode[(mode &amp; S_IFMT)&gt;&gt;S_SHIFT]; // oob
}

However, when the index is determined this way, an out-of-bounds (OOB)
error occurs by referring to an index that is 1 larger than the array size
when the condition "mode &amp; S_IFMT == S_IFMT" is satisfied.  Therefore, a
patch to resize the nilfs_type_by_mode array should be applied to prevent
OOB errors.</Note>
    </Notes>
    <CVE>CVE-2024-26981</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26981.html</URL>
        <Description>CVE-2024-26981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223668</URL>
        <Description>SUSE Bug 1223668</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="207">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check the inode number is not the invalid value of zero

Syskiller has produced an out of bounds access in fill_meta_index().

That out of bounds access is ultimately caused because the inode
has an inode number with the invalid value of zero, which was not checked.

The reason this causes the out of bounds access is due to following
sequence of events:

1. Fill_meta_index() is called to allocate (via empty_meta_index())
   and fill a metadata index.  It however suffers a data read error
   and aborts, invalidating the newly returned empty metadata index.
   It does this by setting the inode number of the index to zero,
   which means unused (zero is not a valid inode number).

2. When fill_meta_index() is subsequently called again on another
   read operation, locate_meta_index() returns the previous index
   because it matches the inode number of 0.  Because this index
   has been returned it is expected to have been filled, and because
   it hasn't been, an out of bounds access is performed.

This patch adds a sanity check which checks that the inode number
is not zero when the inode is created and returns -EINVAL if it is.

[phillip@squashfs.org.uk: whitespace fix]
  Link: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk</Note>
    </Notes>
    <CVE>CVE-2024-26982</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26982.html</URL>
        <Description>CVE-2024-26982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223634</URL>
        <Description>SUSE Bug 1223634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="208">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs: sysfs: Fix reference leak in sysfs_break_active_protection()

The sysfs_break_active_protection() routine has an obvious reference
leak in its error path.  If the call to kernfs_find_and_get() fails then
kn will be NULL, so the companion sysfs_unbreak_active_protection()
routine won't get called (and would only cause an access violation by
trying to dereference kn-&gt;parent if it was called).  As a result, the
reference to kobj acquired at the start of the function will never be
released.

Fix the leak by adding an explicit kobject_put() call when kn is NULL.</Note>
    </Notes>
    <CVE>CVE-2024-26993</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26993.html</URL>
        <Description>CVE-2024-26993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223693</URL>
        <Description>SUSE Bug 1223693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="209">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tun: limit printing rate when illegal packet received by tun dev

vhost_worker will call tun call backs to receive packets. If too many
illegal packets arrives, tun_do_read will keep dumping packet contents.
When console is enabled, it will costs much more cpu time to dump
packet and soft lockup will be detected.

net_ratelimit mechanism can be used to limit the dumping rate.

PID: 33036    TASK: ffff949da6f20000  CPU: 23   COMMAND: "vhost-32980"
 #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253
 #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3
 #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e
 #3 [fffffe00003fced0] do_nmi at ffffffff8922660d
 #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663
    [exception RIP: io_serial_in+20]
    RIP: ffffffff89792594  RSP: ffffa655314979e8  RFLAGS: 00000002
    RAX: ffffffff89792500  RBX: ffffffff8af428a0  RCX: 0000000000000000
    RDX: 00000000000003fd  RSI: 0000000000000005  RDI: ffffffff8af428a0
    RBP: 0000000000002710   R8: 0000000000000004   R9: 000000000000000f
    R10: 0000000000000000  R11: ffffffff8acbf64f  R12: 0000000000000020
    R13: ffffffff8acbf698  R14: 0000000000000058  R15: 0000000000000000
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 #5 [ffffa655314979e8] io_serial_in at ffffffff89792594
 #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470
 #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6
 #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605
 #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558
 #10 [ffffa65531497ac8] console_unlock at ffffffff89316124
 #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07
 #12 [ffffa65531497b68] printk at ffffffff89318306
 #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765
 #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]
 #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]
 #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]
 #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]
 #18 [ffffa65531497f10] kthread at ffffffff892d2e72
 #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f</Note>
    </Notes>
    <CVE>CVE-2024-27013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27013.html</URL>
        <Description>CVE-2024-27013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223745</URL>
        <Description>SUSE Bug 1223745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="210">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Prevent deadlock while disabling aRFS

When disabling aRFS under the `priv-&gt;state_lock`, any scheduled
aRFS works are canceled using the `cancel_work_sync` function,
which waits for the work to end if it has already started.
However, while waiting for the work handler, the handler will
try to acquire the `state_lock` which is already acquired.

The worker acquires the lock to delete the rules if the state
is down, which is not the worker's responsibility since
disabling aRFS deletes the rules.

Add an aRFS state variable, which indicates whether the aRFS is
enabled and prevent adding rules when the aRFS is disabled.

Kernel log:

======================================================
WARNING: possible circular locking dependency detected
6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G          I
------------------------------------------------------
ethtool/386089 is trying to acquire lock:
ffff88810f21ce68 ((work_completion)(&amp;rule-&gt;arfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0

but task is already holding lock:
ffff8884a1808cc0 (&amp;priv-&gt;state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (&amp;priv-&gt;state_lock){+.+.}-{3:3}:
       __mutex_lock+0x80/0xc90
       arfs_handle_work+0x4b/0x3b0 [mlx5_core]
       process_one_work+0x1dc/0x4a0
       worker_thread+0x1bf/0x3c0
       kthread+0xd7/0x100
       ret_from_fork+0x2d/0x50
       ret_from_fork_asm+0x11/0x20

-&gt; #0 ((work_completion)(&amp;rule-&gt;arfs_work)){+.+.}-{0:0}:
       __lock_acquire+0x17b4/0x2c80
       lock_acquire+0xd0/0x2b0
       __flush_work+0x7a/0x4e0
       __cancel_work_timer+0x131/0x1c0
       arfs_del_rules+0x143/0x1e0 [mlx5_core]
       mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]
       mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]
       ethnl_set_channels+0x28f/0x3b0
       ethnl_default_set_doit+0xec/0x240
       genl_family_rcv_msg_doit+0xd0/0x120
       genl_rcv_msg+0x188/0x2c0
       netlink_rcv_skb+0x54/0x100
       genl_rcv+0x24/0x40
       netlink_unicast+0x1a1/0x270
       netlink_sendmsg+0x214/0x460
       __sock_sendmsg+0x38/0x60
       __sys_sendto+0x113/0x170
       __x64_sys_sendto+0x20/0x30
       do_syscall_64+0x40/0xe0
       entry_SYSCALL_64_after_hwframe+0x46/0x4e

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;priv-&gt;state_lock);
                               lock((work_completion)(&amp;rule-&gt;arfs_work));
                               lock(&amp;priv-&gt;state_lock);
  lock((work_completion)(&amp;rule-&gt;arfs_work));

 *** DEADLOCK ***

3 locks held by ethtool/386089:
 #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40
 #1: ffffffff82e94c88 (rtnl_mutex){+.+.}-{3:3}, at: ethnl_default_set_doit+0xd3/0x240
 #2: ffff8884a1808cc0 (&amp;priv-&gt;state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]

stack backtrace:
CPU: 15 PID: 386089 Comm: ethtool Tainted: G          I        6.7.0-rc4_net_next_mlx5_5483eb2 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x60/0xa0
 check_noncircular+0x144/0x160
 __lock_acquire+0x17b4/0x2c80
 lock_acquire+0xd0/0x2b0
 ? __flush_work+0x74/0x4e0
 ? save_trace+0x3e/0x360
 ? __flush_work+0x74/0x4e0
 __flush_work+0x7a/0x4e0
 ? __flush_work+0x74/0x4e0
 ? __lock_acquire+0xa78/0x2c80
 ? lock_acquire+0xd0/0x2b0
 ? mark_held_locks+0x49/0x70
 __cancel_work_timer+0x131/0x1c0
 ? mark_held_locks+0x49/0x70
 arfs_del_rules+0x143/0x1e0 [mlx5_core]
 mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]
 mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]
 ethnl_set_channels+0x28f/0x3b0
 ethnl_default_set_doit+0xec/0x240
 genl_family_rcv_msg_doit+0xd0/0x120
 genl_rcv_msg+0x188/0x2c0
 ? ethn
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-27014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27014.html</URL>
        <Description>CVE-2024-27014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223735</URL>
        <Description>SUSE Bug 1223735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="211">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Use separate handlers for interrupts

For PF to AF interrupt vector and VF to AF vector same
interrupt handler is registered which is causing race condition.
When two interrupts are raised to two CPUs at same time
then two cores serve same event corrupting the data.</Note>
    </Notes>
    <CVE>CVE-2024-27030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27030.html</URL>
        <Description>CVE-2024-27030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223790</URL>
        <Description>SUSE Bug 1223790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="212">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: Fix clk_core_get NULL dereference

It is possible for clk_core_get to dereference a NULL in the following
sequence:

clk_core_get()
    of_clk_get_hw_from_clkspec()
        __of_clk_get_hw_from_provider()
            __clk_get_hw()

__clk_get_hw() can return NULL which is dereferenced by clk_core_get() at
hw-&gt;core.

Prior to commit dde4eff47c82 ("clk: Look for parents with clkdev based
clk_lookups") the check IS_ERR_OR_NULL() was performed which would have
caught the NULL.

Reading the description of this function it talks about returning NULL but
that cannot be so at the moment.

Update the function to check for hw before dereferencing it and return NULL
if hw is NULL.</Note>
    </Notes>
    <CVE>CVE-2024-27038</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27038.html</URL>
        <Description>CVE-2024-27038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223816</URL>
        <Description>SUSE Bug 1223816</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="213">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: hisilicon: hi3559a: Fix an erroneous devm_kfree()

'p_clk' is an array allocated just before the for loop for all clk that
need to be registered.
It is incremented at each loop iteration.

If a clk_register() call fails, 'p_clk' may point to something different
from what should be freed.

The best we can do, is to avoid this wrong release of memory.</Note>
    </Notes>
    <CVE>CVE-2024-27039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27039.html</URL>
        <Description>CVE-2024-27039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223821</URL>
        <Description>SUSE Bug 1223821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="214">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini()

Since 'adev-&gt;dm.dc' in amdgpu_dm_fini() might turn out to be NULL
before the call to dc_enable_dmub_notifications(), check
beforehand to ensure there will not be a possible NULL-ptr-deref
there.

Also, since commit 1e88eb1b2c25 ("drm/amd/display: Drop
CONFIG_DRM_AMD_DC_HDCP") there are two separate checks for NULL in
'adev-&gt;dm.dc' before dc_deinit_callbacks() and dc_dmub_srv_destroy().
Clean up by combining them all under one 'if'.

Found by Linux Verification Center (linuxtesting.org) with static
analysis tool SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-27041</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27041.html</URL>
        <Description>CVE-2024-27041</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223714</URL>
        <Description>SUSE Bug 1223714</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="215">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: edia: dvbdev: fix a use-after-free

In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed
in several error-handling paths. However, *pdvbdev is not set to NULL
after dvbdev's deallocation, causing use-after-frees in many places,
for example, in the following call chain:

budget_register
  |-&gt; dvb_dmxdev_init
        |-&gt; dvb_register_device
  |-&gt; dvb_dmxdev_release
        |-&gt; dvb_unregister_device
              |-&gt; dvb_remove_device
                    |-&gt; dvb_device_put
                          |-&gt; kref_put

When calling dvb_unregister_device, dmxdev-&gt;dvbdev (i.e. *pdvbdev in
dvb_register_device) could point to memory that had been freed in
dvb_register_device. Thereafter, this pointer is transferred to
kref_put and triggering a use-after-free.</Note>
    </Notes>
    <CVE>CVE-2024-27043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27043.html</URL>
        <Description>CVE-2024-27043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218562</URL>
        <Description>SUSE Bug 1218562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223824</URL>
        <Description>SUSE Bug 1223824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223825</URL>
        <Description>SUSE Bug 1223825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="216">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfp: flower: handle acti_netdevs allocation failure

The kmalloc_array() in nfp_fl_lag_do_work() will return null, if
the physical memory has run out. As a result, if we dereference
the acti_netdevs, the null pointer dereference bugs will happen.

This patch adds a check to judge whether allocation failure occurs.
If it happens, the delayed work will be rescheduled and try again.</Note>
    </Notes>
    <CVE>CVE-2024-27046</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27046.html</URL>
        <Description>CVE-2024-27046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223827</URL>
        <Description>SUSE Bug 1223827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="217">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: ensure offloading TID queue exists

The resume code path assumes that the TX queue for the offloading TID
has been configured. At resume time it then tries to sync the write
pointer as it may have been updated by the firmware.

In the unusual event that no packets have been send on TID 0, the queue
will not have been allocated and this causes a crash. Fix this by
ensuring the queue exist at suspend time.</Note>
    </Notes>
    <CVE>CVE-2024-27056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27056.html</URL>
        <Description>CVE-2024-27056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223822</URL>
        <Description>SUSE Bug 1223822</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="218">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nouveau: lock the client object tree.

It appears the client object tree has no locking unless I've missed
something else. Fix races around adding/removing client objects,
mostly vram bar mappings.

 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI
[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27
[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021
[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]
[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 &lt;48&gt; 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe
[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206
[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58
[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400
[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000
[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0
[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007
[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000
[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0
[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4562.099544] Call Trace:
[ 4562.099555]  &lt;TASK&gt;
[ 4562.099573]  ? die_addr+0x36/0x90
[ 4562.099583]  ? exc_general_protection+0x246/0x4a0
[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30
[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]
[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]
[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]
[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]
[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0
[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]
[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270
[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]
[ 4562.100356]  __do_fault+0x32/0x150
[ 4562.100362]  do_fault+0x7c/0x560
[ 4562.100369]  __handle_mm_fault+0x800/0xc10
[ 4562.100382]  handle_mm_fault+0x17c/0x3e0
[ 4562.100388]  do_user_addr_fault+0x208/0x860
[ 4562.100395]  exc_page_fault+0x7f/0x200
[ 4562.100402]  asm_exc_page_fault+0x26/0x30
[ 4562.100412] RIP: 0033:0x9b9870
[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 &lt;44&gt; 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7
[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246
[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000
[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066
[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000
[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff
[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 4562.100446]  &lt;/TASK&gt;
[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink 
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-27062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27062.html</URL>
        <Description>CVE-2024-27062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223834</URL>
        <Description>SUSE Bug 1223834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="219">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pstore: inode: Only d_invalidate() is needed

Unloading a modular pstore backend with records in pstorefs would
trigger the dput() double-drop warning:

  WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410

Using the combo of d_drop()/dput() (as mentioned in
Documentation/filesystems/vfs.rst) isn't the right approach here, and
leads to the reference counting problem seen above. Use d_invalidate()
and update the code to not bother checking for error codes that can
never happen.

---</Note>
    </Notes>
    <CVE>CVE-2024-27389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27389.html</URL>
        <Description>CVE-2024-27389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223705</URL>
        <Description>SUSE Bug 1223705</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
